Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2024.4413.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2024:4413-1)
Summary:The remote host is missing an update for the 'gdb' package(s) announced via the SUSE-SU-2024:4413-1 advisory.
Description:Summary:
The remote host is missing an update for the 'gdb' package(s) announced via the SUSE-SU-2024:4413-1 advisory.

Vulnerability Insight:
This update for gdb fixes the following issues:

Mention changes in GDB 14:

* GDB now supports the AArch64 Scalable Matrix Extension 2
(SME2), which includes a new 512 bit lookup table register
named ZT0.
* GDB now supports the AArch64 Scalable Matrix Extension (SME),
which includes a new matrix register named ZA, a new thread
register TPIDR2 and a new vector length register SVG
(streaming vector granule). GDB also supports tracking ZA
state across signal frames. Some features are still under
development or are dependent on ABI specs that are still in
alpha stage. For example, manual function calls with ZA state
don't have any special handling, and tracking of SVG changes
based on DWARF information is still not implemented, but there
are plans to do so in the future.
* GDB now recognizes the NO_COLOR environment variable and
disables styling according to the spec. See
[link moved to references]. Styling can be re-enabled with
'set style enabled on'.
* The AArch64 'org.gnu.gdb.aarch64.pauth' Pointer Authentication
feature string has been deprecated in favor of the
'org.gnu.gdb.aarch64.pauth_v2' feature string.
* GDB now has some support for integer types larger than 64 bits.
* Multi-target feature configuration.
GDB now supports the individual configuration of remote
targets' feature sets. Based on the current selection of a
target, the commands 'set remote -packet (onoffauto)'
and 'show remote -packet' can be used to configure a
target's feature packet and to display its configuration,
respectively.
* GDB has initial built-in support for the Debugger Adapter
Protocol.
* For the break command, multiple uses of the 'thread' or 'task'
keywords will now give an error instead of just using the
thread or task id from the last instance of the keyword. E.g.:
break foo thread 1 thread 2
will now give an error rather than using 'thread 2'.
* For the watch command, multiple uses of the 'task' keyword will
now give an error instead of just using the task id from the
last instance of the keyword. E.g.:
watch my_var task 1 task 2
will now give an error rather than using 'task 2'. The
'thread' keyword already gave an error when used multiple times
with the watch command, this remains unchanged.
* The 'set print elements' setting now helps when printing large
arrays. If an array would otherwise exceed max-value-size, but
'print elements' is set such that the size of elements to print
is less than or equal to 'max-value-size', GDB will now still
print the array, however only 'max-value-size' worth of data
will be added into the value history.
* For both the break and watch commands, it is now invalid to use
both the 'thread' and 'task' keywords within the same command.
For example the following commnds will now give an error:
break foo thread 1 task 1
watch var thread 2 task 3
* The printf command now accepts a '%V' ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'gdb' package(s) on SUSE Linux Enterprise Server 15-SP2, SUSE Linux Enterprise Server 15-SP3, SUSE Linux Enterprise Server for SAP Applications 15-SP2, SUSE Linux Enterprise Server for SAP Applications 15-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-48064
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/
https://sourceware.org/bugzilla/show_bug.cgi?id=29922
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8f2c64de86bc3d7556121fe296dd679000283931
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.