SUSE Security Update: Security update for gdb
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:2914-1
Rating:             moderate
References:         #1115034 #1142772 #1145692 
Cross-References:   CVE-2019-1010180
Affected Products:
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server for SAP 12-SP1
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for gdb fixes the following issues:

   Update to gdb 8.3.1: (jsc#ECO-368)

   Security issues fixed:

   - CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF
     sections larger than the file. (bsc#1142772)

   Upgrade libipt from v2.0 to v2.0.1.

   - Enable librpm for version > librpm.so.3 [bsc#1145692]:
     * Allow any librpm.so.x
     * Add %build test to check for "zypper install " message

   - Copy gdbinit from fedora master @ 25caf28.  Add gdbinit.without-python,
     and use it for --without=python.

   Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

   * DWARF index cache: GDB can now automatically save indices of DWARF
     symbols on disk to speed up further loading of the same binaries.
   * Ada task switching is now supported on aarch64-elf targets when
     debugging a program using the Ravenscar Profile.
   * Terminal styling is now available for the CLI and the TUI.
   * Removed support for old demangling styles arm, edg, gnu, hp and lucid.
   * Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

   - Implemented access to more POWER8 registers.  [fate#326120, fate#325178]

   - Add gdb-s390-handle-arch13.diff to handle most new s390 arch13
     instructions.  [fate#327369, jsc#ECO-368]


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2019-2914=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-2914=1

   - SUSE Linux Enterprise Server for SAP 12-SP1:

      zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-2914=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-2914=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-2914=1

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-2914=1



Package List:

   - SUSE OpenStack Cloud 7 (s390x x86_64):

      gdb-8.3.1-1.12.1
      gdb-debuginfo-8.3.1-1.12.1
      gdb-debugsource-8.3.1-1.12.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

      gdb-8.3.1-1.12.1
      gdb-debuginfo-8.3.1-1.12.1
      gdb-debugsource-8.3.1-1.12.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

      gdb-8.3.1-1.12.1
      gdb-debuginfo-8.3.1-1.12.1
      gdb-debugsource-8.3.1-1.12.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

      gdb-8.3.1-1.12.1
      gdb-debuginfo-8.3.1-1.12.1
      gdb-debugsource-8.3.1-1.12.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      gdb-8.3.1-1.12.1
      gdb-debuginfo-8.3.1-1.12.1
      gdb-debugsource-8.3.1-1.12.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      gdb-8.3.1-1.12.1
      gdb-debuginfo-8.3.1-1.12.1
      gdb-debugsource-8.3.1-1.12.1


References:

   https://www.suse.com/security/cve/CVE-2019-1010180.html
   https://bugzilla.suse.com/1115034
   https://bugzilla.suse.com/1142772
   https://bugzilla.suse.com/1145692

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:2914-1 moderate: gdb

November 7, 2019
An update that solves one vulnerability and has two fixes is now available

Summary

This update for gdb fixes the following issues: Update to gdb 8.3.1: (jsc#ECO-368) Security issues fixed: - CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772) Upgrade libipt from v2.0 to v2.0.1. - Enable librpm for version > librpm.so.3 [bsc#1145692]: * Allow any librpm.so.x * Add %build test to check for "zypper install " message - Copy gdbinit from fedora master @ 25caf28. Add gdbinit.without-python, and use it for --without=python. Rebase to 8.3 release (as in fedora 30 @ 1e222a3). * DWARF index cache: GDB can now automatically save indices of DWARF symbols on disk to speed up further loading of the same binaries. * Ada task switching is now supported on aarch64-elf targets when debugging a program using the Ravenscar Profile. * Terminal styling is now available for the CLI and the TUI. * Removed support for old demangling styles arm, edg, gnu, hp and lucid. * Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*). - Implemented access to more POWER8 registers. [fate#326120, fate#325178] - Add gdb-s390-handle-arch13.diff to handle most new s390 arch13 instructions. [fate#327369, jsc#ECO-368] Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2019-2914=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-2914=1 - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-2914=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-2914=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-2914=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-2914=1 Package List: - SUSE OpenStack Cloud 7 (s390x x86_64): gdb-8.3.1-1.12.1 gdb-debuginfo-8.3.1-1.12.1 gdb-debugsource-8.3.1-1.12.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): gdb-8.3.1-1.12.1 gdb-debuginfo-8.3.1-1.12.1 gdb-debugsource-8.3.1-1.12.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): gdb-8.3.1-1.12.1 gdb-debuginfo-8.3.1-1.12.1 gdb-debugsource-8.3.1-1.12.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64): gdb-8.3.1-1.12.1 gdb-debuginfo-8.3.1-1.12.1 gdb-debugsource-8.3.1-1.12.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): gdb-8.3.1-1.12.1 gdb-debuginfo-8.3.1-1.12.1 gdb-debugsource-8.3.1-1.12.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): gdb-8.3.1-1.12.1 gdb-debuginfo-8.3.1-1.12.1 gdb-debugsource-8.3.1-1.12.1

References

#1115034 #1142772 #1145692

Cross- CVE-2019-1010180

Affected Products:

SUSE OpenStack Cloud 7

SUSE Linux Enterprise Server for SAP 12-SP2

SUSE Linux Enterprise Server for SAP 12-SP1

SUSE Linux Enterprise Server 12-SP2-LTSS

SUSE Linux Enterprise Server 12-SP2-BCL

SUSE Linux Enterprise Server 12-SP1-LTSS

https://www.suse.com/security/cve/CVE-2019-1010180.html

https://bugzilla.suse.com/1115034

https://bugzilla.suse.com/1142772

https://bugzilla.suse.com/1145692

Severity
Announcement ID: SUSE-SU-2019:2914-1
Rating: moderate

Related News