Bug 1226237 (CVE-2024-36699) - VUL-0: CVE-2024-36699: gdb: buffer overflow via the gdb.selected_inferior().read_memory component at utils.c
Summary: VUL-0: CVE-2024-36699: gdb: buffer overflow via the gdb.selected_inferior().r...
Status: RESOLVED INVALID
Alias: CVE-2024-36699
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Tom de Vries
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/410359/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-36699:3.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-06-12 17:28 UTC by SMASH SMASH
Modified: 2024-06-21 09:49 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 3 Camila Camargo de Matos 2024-06-12 17:41:49 UTC
The patch link [0] provided by NVD seems to be broken, as the resource being referenced by it does not exist. The correct link is probably the one from [1].

The upstream bug for this issue [2] references the correct patch, which is the one from commit 06e967db [3].

[0] https://sourceware.orga/pipermail/gdb-patches/2024-April/2080
[1] https://sourceware.org/pipermail/gdb-patches/2024-April/208019.html
[2] https://sourceware.org/bugzilla/show_bug.cgi?id=31631
[3] https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=06e967dbc9b75a4a3c1b15b54360cf1abbf9c2bd
Comment 7 Tom de Vries 2024-06-14 14:43:01 UTC
Here ( https://bugzilla.redhat.com/show_bug.cgi?id=2292169#c2 ) we find:
...
Red Hat Product Security does not consider this to be a vulnerability.
...

Likewise here ( https://bugzilla.redhat.com/show_bug.cgi?id=2292166#c2 ).
Comment 8 Tom de Vries 2024-06-19 13:06:50 UTC
The CVE was rejected.