It was discovered , the the GNU Debugger (gdb) would load untrusted files
from the current working directory when .debug_gdb_scripts was defined. While
this was a design decision, it is an insecure one and users who do not
pre-inspect untrusted files may execute arbitrary code with their privileges.
GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined,
automatically loads certain files from the current working directory, which
allows local users to gain privileges via crafted files such as Python
According to CVE this is fixed in 7.5 That has already been stabilized
@maintainers: Please clean up vulnerable versions
Maintainer(s), please drop the vulnerable version(s).
Maintaner(s): Please drop affected versions, security will remove or mask in 30 days if no response.
Vulnerable versions have been removed.
Security, please vote.
GLSA Vote: No
Thank you all. Closing as noglsa.