This update for gdb fixes the following issues :
Update to gdb 8.3.1: (jsc#ECO-368)
Security issues fixed :
Upgrade libipt from v2.0 to v2.0.1.
Enable librpm for version > librpm.so.3 [bsc#1145692] :
Allow any librpm.so.x
Add %build test to check for ‘zypper install <rpm-packagename>’ message
Copy gdbinit from fedora master @ 25caf28. Add gdbinit.without-python, and use it for --without=python.
Rebase to 8.3 release (as in fedora 30 @ 1e222a3).
DWARF index cache: GDB can now automatically save indices of DWARF symbols on disk to speed up further loading of the same binaries.
Ada task switching is now supported on aarch64-elf targets when debugging a program using the Ravenscar Profile.
Terminal styling is now available for the CLI and the TUI.
Removed support for old demangling styles arm, edg, gnu, hp and lucid.
Support for new native configuration RISC-V GNU/Linux (riscv*--linux).
Implemented access to more POWER8 registers.
[fate#326120, fate#325178]
Handle most of new s390 arch13 instructions.
[fate#327369, jsc#ECO-368]
This update was imported from the SUSE:SLE-15:Update update project.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2019-2493.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(130939);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/11");
script_cve_id("CVE-2019-1010180");
script_name(english:"openSUSE Security Update : gdb (openSUSE-2019-2493)");
script_set_attribute(attribute:"synopsis", value:
"The remote openSUSE host is missing a security update.");
script_set_attribute(attribute:"description", value:
"This update for gdb fixes the following issues :
Update to gdb 8.3.1: (jsc#ECO-368)
Security issues fixed :
- CVE-2019-1010180: Fixed a potential buffer overflow when
loading ELF sections larger than the file. (bsc#1142772)
Upgrade libipt from v2.0 to v2.0.1.
- Enable librpm for version > librpm.so.3 [bsc#1145692] :
- Allow any librpm.so.x
- Add %build test to check for 'zypper install
<rpm-packagename>' message
- Copy gdbinit from fedora master @ 25caf28. Add
gdbinit.without-python, and use it for --without=python.
Rebase to 8.3 release (as in fedora 30 @ 1e222a3).
- DWARF index cache: GDB can now automatically save
indices of DWARF symbols on disk to speed up further
loading of the same binaries.
- Ada task switching is now supported on aarch64-elf
targets when debugging a program using the Ravenscar
Profile.
- Terminal styling is now available for the CLI and the
TUI.
- Removed support for old demangling styles arm, edg, gnu,
hp and lucid.
- Support for new native configuration RISC-V GNU/Linux
(riscv*-*-linux*).
- Implemented access to more POWER8 registers.
[fate#326120, fate#325178]
- Handle most of new s390 arch13 instructions.
[fate#327369, jsc#ECO-368]
This update was imported from the SUSE:SLE-15:Update update project.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1115034");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1142772");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1145692");
script_set_attribute(attribute:"see_also", value:"https://features.opensuse.org/325178");
script_set_attribute(attribute:"see_also", value:"https://features.opensuse.org/326120");
script_set_attribute(attribute:"see_also", value:"https://features.opensuse.org/327369");
script_set_attribute(attribute:"solution", value:
"Update the affected gdb packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1010180");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/24");
script_set_attribute(attribute:"patch_publication_date", value:"2019/11/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/13");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gdb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gdb-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gdb-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gdb-testresults");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gdbserver");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gdbserver-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE15.0", reference:"gdb-8.3.1-lp150.2.10.1") ) flag++;
if ( rpm_check(release:"SUSE15.0", reference:"gdb-debuginfo-8.3.1-lp150.2.10.1") ) flag++;
if ( rpm_check(release:"SUSE15.0", reference:"gdb-debugsource-8.3.1-lp150.2.10.1") ) flag++;
if ( rpm_check(release:"SUSE15.0", reference:"gdb-testresults-8.3.1-lp150.2.10.1") ) flag++;
if ( rpm_check(release:"SUSE15.0", reference:"gdbserver-8.3.1-lp150.2.10.1") ) flag++;
if ( rpm_check(release:"SUSE15.0", reference:"gdbserver-debuginfo-8.3.1-lp150.2.10.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gdb / gdb-debuginfo / gdb-debugsource / gdb-testresults / gdbserver / etc");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | opensuse | gdb | p-cpe:/a:novell:opensuse:gdb |
novell | opensuse | gdb-debuginfo | p-cpe:/a:novell:opensuse:gdb-debuginfo |
novell | opensuse | gdb-debugsource | p-cpe:/a:novell:opensuse:gdb-debugsource |
novell | opensuse | gdb-testresults | p-cpe:/a:novell:opensuse:gdb-testresults |
novell | opensuse | gdbserver | p-cpe:/a:novell:opensuse:gdbserver |
novell | opensuse | gdbserver-debuginfo | p-cpe:/a:novell:opensuse:gdbserver-debuginfo |
novell | opensuse | 15.0 | cpe:/o:novell:opensuse:15.0 |