<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2026-0012</id>
    <title>An update for gdb is now available for HCE 3.0</title>
    <severity>Important</severity>
    <release>HCE 3.0</release>
    <issued date="2026-03-02 12:28:53"/>
    <updated date="2026-03-02 12:28:53"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-11494" id="CVE-2025-11494" title="CVE-2025-11494 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-39129" id="CVE-2023-39129" title="CVE-2023-39129 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-9778" id="CVE-2017-9778" title="CVE-2017-9778 Base Score: 5.5 Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-39130" id="CVE-2023-39130" title="CVE-2023-39130 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083" id="CVE-2025-11083" title="CVE-2025-11083 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-11840" id="CVE-2025-11840" title="CVE-2025-11840 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412" id="CVE-2025-11412" title="CVE-2025-11412 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-11082" id="CVE-2025-11082" title="CVE-2025-11082 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-39128" id="CVE-2023-39128" title="CVE-2023-39128 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue. (CVE-2025-11494)

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c. (CVE-2023-39129)

GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB. (CVE-2017-9778)

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c. (CVE-2023-39130)

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with &quot;[f]ixed for 2.46&quot;. (CVE-2025-11083)

A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing a manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. This patch is called 16357. It is best practice to apply a patch to resolve this issue. (CVE-2025-11840)

A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch. (CVE-2025-11412)

A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with &quot;[f]ixed for 2.46&quot;. (CVE-2025-11082)

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c. (CVE-2023-39128)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="gdb">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="gdb" version="14.1" release="3.r5.hce3">
          <filename>gdb-14.1-3.r5.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="gdb-gdbserver" version="14.1" release="3.r5.hce3">
          <filename>gdb-gdbserver-14.1-3.r5.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="gdb-headless" version="14.1" release="3.r5.hce3">
          <filename>gdb-headless-14.1-3.r5.hce3.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="gdb-help" version="14.1" release="3.r5.hce3">
          <filename>gdb-help-14.1-3.r5.hce3.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="gdb" version="14.1" release="3.r5.hce3">
          <filename>gdb-14.1-3.r5.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="gdb-gdbserver" version="14.1" release="3.r5.hce3">
          <filename>gdb-gdbserver-14.1-3.r5.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="gdb-headless" version="14.1" release="3.r5.hce3">
          <filename>gdb-headless-14.1-3.r5.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
