Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in gdb
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in gdb
ID: SUSE-SU-2024:0898-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Desktop 15 SP5, SUSE Development Tools Module 15-SP5, SUSE openSUSE Leap 15.5, SUSE openSUSE Leap 15.4, SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4, SUSE Linux Enterprise High Performance Computing LTSS 15 SP4, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4, SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
Datum: Fr, 15. März 2024, 18:11
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829
Applikationen: GDB

Originalnachricht

--===============2495245504645472456==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for gdb

Announcement ID: SUSE-SU-2024:0898-1
Rating: moderate
References:

* bsc#1068950
* bsc#1081527
* bsc#1211052
* jsc#PED-6584


Cross-References:

* CVE-2017-16829
* CVE-2018-7208
* CVE-2022-48064


CVSS scores:

* CVE-2017-16829 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2017-16829 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-7208 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-7208 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48064 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
* CVE-2022-48064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H


Affected Products:

* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5



An update that solves three vulnerabilities and contains one feature can now be
installed.

## Description:

This update for gdb fixes the following issues:

* Drop libdebuginfod1 BuildRequires/Recommends. The former isn't needed
because there's a build requirement on libdebuginfod-devel already,
which
will pull the shared library. And the latter, because it's bogus since
RPM
auto generated dependency will take care of that requirement.

gdb was released in 13.2:

* This version of GDB includes the following changes and enhancements:

* Support for the following new targets has been added in both GDB and
GDBserver:

* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*


* The Windows native target now supports target async.

* Floating-point support has now been added on LoongArch GNU/Linux.
* New commands:

* set print nibbles [on|off]
* show print nibbles

* This controls whether the 'print/t' command will
display binary values in groups of four bits, known as "nibbles". The default is 'off'.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or
developers. See the gdb/NEWS file for more details.


* Python API improvements:

* New Python API for instruction disassembly.

* The new attribute 'locations' of gdb.Breakpoint
returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that
formats ADDRESS as 'address '
* New function gdb.current_language that returns the name of the current
language. Unlike gdb.parameter('language'), this will never return 'auto'.
* New function gdb.print_options that returns a dictionary of the
prevailing print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the
frame's language.
* gdb.Value.format_string now uses the format provided by
'print', if it is called during a 'print' or other similar operation.
* gdb.Value.format_string now accepts the 'summary'
keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
* The gdb.register_window_type method now restricts the set of acceptable
window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9].


* GDB/MI changes:

* MI version 1 is deprecated, and will be removed in GDB 14.
* The async record stating the stopped reason 'breakpoint-hit'
now contains an optional field locno.
* Miscellaneous improvements:

* gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD)
for ELF.
* New convenience variable $_inferior_thread_count contains the number of
live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the
breakpoint number and the breakpoint location number of the breakpoint last hit.
* The "info breakpoints" now displays enabled
breakpoint locations of disabled breakpoints as in the "y-" state.
* The format of 'disassemble /r' and 'record
instruction-history /r' has changed to match the layout of GNU objdump when disassembling.

* A new format "/b" has been introduce to provide the
old behavior of "/r".
* The TUI no longer styles the source and assembly code highlighted by
the current position indicator by default. You can however re-enable styling using the new "set style tui-current-position" command.
* It is now possible to use the "document" command to
document user-defined commands.
* Support for memory tag data for AArch64 MTE.


* Support Removal notices:

* DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is
now only possible to build GDB against Python 3.
* Support for the following commands has been removed:

* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv

* Use the "set/show debug solib" commands instead.


See the NEWS file for a more complete and detailed list of what this release
includes.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-898=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-898=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-898=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-898=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-898=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-898=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-898=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-898=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586 nosrc)
* gdb-testresults-13.2-150400.15.14.4
* openSUSE Leap 15.4 (aarch64_ilp32)
* gdb-64bit-debuginfo-13.2-150400.15.14.1
* gdbserver-64bit-13.2-150400.15.14.1
* gdbserver-64bit-debuginfo-13.2-150400.15.14.1
* gdb-64bit-13.2-150400.15.14.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* gdb-testresults-13.2-150400.15.14.4
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gdb-debugsource-13.2-150400.15.14.1
* gdb-13.2-150400.15.14.1
* gdbserver-13.2-150400.15.14.1
* gdb-debuginfo-13.2-150400.15.14.1
* gdbserver-debuginfo-13.2-150400.15.14.1

## References:

* https://www.suse.com/security/cve/CVE-2017-16829.html
* https://www.suse.com/security/cve/CVE-2018-7208.html
* https://www.suse.com/security/cve/CVE-2022-48064.html
* https://bugzilla.suse.com/show_bug.cgi?id=1068950
* https://bugzilla.suse.com/show_bug.cgi?id=1081527
* https://bugzilla.suse.com/show_bug.cgi?id=1211052
* https://jira.suse.com/browse/PED-6584


--===============2495245504645472456==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for gdb</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:0898-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1068950">bsc#1068950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1081527">bsc#1081527</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211052">bsc#1211052</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-6584">jsc#PED-6584</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2017-16829.html">CVE-2017-16829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2018-7208.html">CVE-2018-7208</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48064.html">CVE-2022-48064</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-16829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-16829</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2018-7208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2018-7208</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">Development
Tools Module 15-SP5</li>

<li class="list-group-item">openSUSE Leap
15.4</li>

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing ESPOS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves three vulnerabilities and contains one
feature can now be installed.</p>





<h2>Description:</h2>

<p>This update for gdb fixes the following issues:</p>
<ul>
<li>Drop libdebuginfod1 BuildRequires/Recommends. The former
isn&#x27;t
needed because there&#x27;s a build requirement on libdebuginfod-devel
already, which will pull the shared library. And the latter,
because it&#x27;s bogus since RPM auto generated dependency will take
care of that requirement.</li>
</ul>
<p>gdb was released in 13.2:</p>
<ul>
<li>
<p>This version of GDB includes the following changes and
enhancements:</p>
</li>
<li>
<p>Support for the following new targets has been added in both GDB and
GDBserver:</p>
<pre><code>* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*
</code></pre>
</li>
<li>
<p>The Windows native target now supports target async.</p>
</li>
<li>Floating-point support has now been added on LoongArch
GNU/Linux.</li>
<li>
<p>New commands:</p>
<pre><code>* set print nibbles [on|off]
* show print nibbles

* This controls whether the &amp;#x27;print/t&amp;#x27; command will
display binary values in groups of four bits, known as &amp;quot;nibbles&amp;quot;. The default is &amp;#x27;off&amp;#x27;.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or
developers. See the gdb/NEWS file for more details.
</code></pre>
</li>
<li>
<p>Python API improvements:</p>
<pre><code> * New Python API for instruction disassembly.

* The new attribute &amp;#x27;locations&amp;#x27; of gdb.Breakpoint
returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that
formats ADDRESS as &amp;#x27;address &amp;#x27;
* New function gdb.current_language that returns the name of the current
language. Unlike gdb.parameter(&amp;#x27;language&amp;#x27;), this will never return &amp;#x27;auto&amp;#x27;.
* New function gdb.print_options that returns a dictionary of the prevailing
print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the
frame&amp;#x27;s language.
* gdb.Value.format_string now uses the format provided by
&amp;#x27;print&amp;#x27;, if it is called during a &amp;#x27;print&amp;#x27; or other similar operation.
* gdb.Value.format_string now accepts the &amp;#x27;summary&amp;#x27;
keyword. This can be used to request a shorter representation of a value, the way that &amp;#x27;set print frame-arguments scalars&amp;#x27; does.
* The gdb.register_window_type method now restricts the set of acceptable
window names. The first character of a window&amp;#x27;s name must start with a character in the set [a-zA-Z], every subsequent character of a window&amp;#x27;s name must be in the set [-_.a-zA-Z0-9].
</code></pre>
<ul>
<li>
<p>GDB/MI changes:</p>
<ul>
<li>MI version 1 is deprecated, and will be removed in GDB 14.</li>
<li>The async record stating the stopped reason
&#x27;breakpoint-hit&#x27; now contains an optional field locno. </li>
</ul>
</li>
</ul>
</li>
<li>
<p>Miscellaneous improvements:</p>
<pre><code> * gdb now supports zstd compressed debug sections
(ELFCOMPRESS_ZSTD) for ELF.
* New convenience variable $_inferior_thread_count contains the number of
live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the
breakpoint number and the breakpoint location number of the breakpoint last hit.
* The &amp;quot;info breakpoints&amp;quot; now displays enabled
breakpoint locations of disabled breakpoints as in the &amp;quot;y-&amp;quot; state.
* The format of &amp;#x27;disassemble /r&amp;#x27; and
&amp;#x27;record instruction-history /r&amp;#x27; has changed to match the layout of GNU objdump when disassembling.

* A new format &amp;quot;/b&amp;quot; has been introduce to provide
the old behavior of &amp;quot;/r&amp;quot;.
* The TUI no longer styles the source and assembly code highlighted by the
current position indicator by default. You can however re-enable styling using the new &amp;quot;set style tui-current-position&amp;quot; command.
* It is now possible to use the &amp;quot;document&amp;quot; command
to document user-defined commands.
* Support for memory tag data for AArch64 MTE.
</code></pre>
</li>
<li>
<p>Support Removal notices:</p>
<pre><code> * DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is now
only possible to build GDB against Python 3.
* Support for the following commands has been removed:

* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv

* Use the &amp;quot;set/show debug solib&amp;quot; commands instead.
</code></pre>
</li>
</ul>
<p>See the NEWS file for a more complete and detailed list of what this
release includes.</p>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.4


<br/>
<code>zypper in -t patch
SUSE-2024-898=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.5-2024-898=1</code>



</li>

<li class="list-group-item">
Development Tools Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Development-Tools-15-SP5-2024-898=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-898=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-898=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-898=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-898=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP4-2024-898=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586
nosrc)
<ul>


<li>gdb-testresults-13.2-150400.15.14.4</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64_ilp32)
<ul>


<li>gdb-64bit-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-64bit-13.2-150400.15.14.1</li>


<li>gdbserver-64bit-debuginfo-13.2-150400.15.14.1</li>

<li>gdb-64bit-13.2-150400.15.14.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>


<li>gdb-testresults-13.2-150400.15.14.4</li>

</ul>
</li>



<li>
Development Tools Module 15-SP5 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
ppc64le s390x x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(ppc64le x86_64)
<ul>


<li>gdb-debugsource-13.2-150400.15.14.1</li>

<li>gdb-13.2-150400.15.14.1</li>

<li>gdbserver-13.2-150400.15.14.1</li>


<li>gdb-debuginfo-13.2-150400.15.14.1</li>


<li>gdbserver-debuginfo-13.2-150400.15.14.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2017-16829.html">https://www.suse.com/security/cve/CVE-2017-16829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2018-7208.html">https://www.suse.com/security/cve/CVE-2018-7208.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48064.html">https://www.suse.com/security/cve/CVE-2022-48064.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1068950">https://bugzilla.suse.com/show_bug.cgi?id=1068950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1081527">https://bugzilla.suse.com/show_bug.cgi?id=1081527</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211052">https://bugzilla.suse.com/show_bug.cgi?id=1211052</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-6584">https://jira.suse.com/browse/PED-6584</a>
</li>


</ul>

</div>

--===============2495245504645472456==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung