Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-19931
Vulnerability from cvelistv5
Published
2018-12-07 07:00
Modified
2024-08-05 11:51
Severity ?
EPSS score ?
Summary
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:51:17.792Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { name: "106144", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106144", }, { name: "GLSA-201908-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201908-01", }, { name: "openSUSE-SU-2019:2415", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { name: "openSUSE-SU-2019:2432", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { name: "USN-4336-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4336-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-29T02:06:09", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { tags: [ "x_refsource_MISC", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { name: "106144", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106144", }, { name: "GLSA-201908-01", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201908-01", }, { name: "openSUSE-SU-2019:2415", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { name: "openSUSE-SU-2019:2432", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { name: "USN-4336-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4336-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-19931", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", refsource: "MISC", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", refsource: "MISC", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", }, { name: "https://security.netapp.com/advisory/ntap-20190221-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { name: "106144", refsource: "BID", url: "http://www.securityfocus.com/bid/106144", }, { name: "GLSA-201908-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201908-01", }, { name: "openSUSE-SU-2019:2415", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { name: "openSUSE-SU-2019:2432", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { name: "USN-4336-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4336-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-19931", datePublished: "2018-12-07T07:00:00", dateReserved: "2018-12-07T00:00:00", dateUpdated: "2024-08-05T11:51:17.792Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2018-19931\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-12-07T07:29:00.253\",\"lastModified\":\"2024-11-21T03:58:49.940\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils 2.31. Hay un desbordamiento de búfer basado en memoria dinámica (heap) en bfd_elf32_swap_phdr_in en elfcode.h debido a que el número de cabeceras del programa no está restringido.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.31\",\"matchCriteriaId\":\"421B3097-1A0F-4D5E-B0BD-8FC9752D8490\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:clustered_data_ontap:*:*\",\"versionStartIncluding\":\"7.2\",\"matchCriteriaId\":\"C57F75D8-DF7A-49D1-BB27-FF21661107B3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/106144\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-01\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190221-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=23942\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/106144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190221-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=23942\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
opensuse-su-2024:10651-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
binutils-2.37-1.3 on GA media
Notes
Title of the patch
binutils-2.37-1.3 on GA media
Description of the patch
These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10651
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "binutils-2.37-1.3 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10651", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10651-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-9939 page", url: "https://www.suse.com/security/cve/CVE-2014-9939/", }, { category: "self", summary: "SUSE CVE CVE-2017-12448 page", url: "https://www.suse.com/security/cve/CVE-2017-12448/", }, { category: "self", summary: "SUSE CVE CVE-2017-12450 page", url: "https://www.suse.com/security/cve/CVE-2017-12450/", }, { category: "self", summary: "SUSE CVE CVE-2017-12452 page", url: "https://www.suse.com/security/cve/CVE-2017-12452/", }, { category: "self", summary: "SUSE CVE CVE-2017-12453 page", url: "https://www.suse.com/security/cve/CVE-2017-12453/", }, { category: "self", summary: "SUSE CVE CVE-2017-12454 page", url: "https://www.suse.com/security/cve/CVE-2017-12454/", }, { category: "self", summary: "SUSE CVE CVE-2017-12456 page", url: "https://www.suse.com/security/cve/CVE-2017-12456/", }, { category: "self", summary: "SUSE CVE CVE-2017-12799 page", url: "https://www.suse.com/security/cve/CVE-2017-12799/", }, { category: "self", summary: "SUSE CVE CVE-2017-13757 page", url: "https://www.suse.com/security/cve/CVE-2017-13757/", }, { category: "self", summary: "SUSE CVE CVE-2017-14128 page", url: "https://www.suse.com/security/cve/CVE-2017-14128/", }, { category: "self", summary: "SUSE CVE CVE-2017-14129 page", url: "https://www.suse.com/security/cve/CVE-2017-14129/", }, { category: "self", summary: "SUSE CVE CVE-2017-14130 page", url: "https://www.suse.com/security/cve/CVE-2017-14130/", }, { category: "self", summary: "SUSE CVE CVE-2017-14333 page", url: "https://www.suse.com/security/cve/CVE-2017-14333/", }, { category: "self", summary: "SUSE CVE CVE-2017-14529 page", url: "https://www.suse.com/security/cve/CVE-2017-14529/", }, { category: "self", summary: "SUSE CVE CVE-2017-14729 page", url: "https://www.suse.com/security/cve/CVE-2017-14729/", }, { category: "self", summary: "SUSE CVE CVE-2017-14745 page", url: "https://www.suse.com/security/cve/CVE-2017-14745/", }, { category: "self", summary: "SUSE CVE CVE-2017-14974 page", url: "https://www.suse.com/security/cve/CVE-2017-14974/", }, { category: "self", summary: "SUSE CVE CVE-2017-15938 page", url: "https://www.suse.com/security/cve/CVE-2017-15938/", }, { category: "self", summary: "SUSE CVE CVE-2017-15939 page", url: "https://www.suse.com/security/cve/CVE-2017-15939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15996 page", url: "https://www.suse.com/security/cve/CVE-2017-15996/", }, { category: "self", summary: "SUSE CVE CVE-2017-16826 page", url: "https://www.suse.com/security/cve/CVE-2017-16826/", }, { category: "self", summary: "SUSE CVE CVE-2017-16827 page", url: "https://www.suse.com/security/cve/CVE-2017-16827/", }, { category: "self", summary: "SUSE CVE CVE-2017-16828 page", url: "https://www.suse.com/security/cve/CVE-2017-16828/", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2017-16830 page", url: "https://www.suse.com/security/cve/CVE-2017-16830/", }, { category: "self", summary: "SUSE CVE CVE-2017-16831 page", url: "https://www.suse.com/security/cve/CVE-2017-16831/", }, { category: "self", summary: "SUSE CVE CVE-2017-16832 page", url: "https://www.suse.com/security/cve/CVE-2017-16832/", }, { category: "self", summary: "SUSE CVE CVE-2017-6965 page", url: "https://www.suse.com/security/cve/CVE-2017-6965/", }, { category: "self", summary: "SUSE CVE CVE-2017-6966 page", url: "https://www.suse.com/security/cve/CVE-2017-6966/", }, { category: "self", summary: "SUSE CVE CVE-2017-6969 page", url: "https://www.suse.com/security/cve/CVE-2017-6969/", }, { category: "self", summary: "SUSE CVE CVE-2017-7209 page", url: "https://www.suse.com/security/cve/CVE-2017-7209/", }, { category: "self", summary: "SUSE CVE CVE-2017-7210 page", url: "https://www.suse.com/security/cve/CVE-2017-7210/", }, { category: "self", summary: "SUSE CVE CVE-2017-7223 page", url: "https://www.suse.com/security/cve/CVE-2017-7223/", }, { category: "self", summary: "SUSE CVE CVE-2017-7224 page", url: "https://www.suse.com/security/cve/CVE-2017-7224/", }, { category: "self", summary: "SUSE CVE CVE-2017-7225 page", url: "https://www.suse.com/security/cve/CVE-2017-7225/", }, { category: "self", summary: "SUSE CVE CVE-2017-7226 page", url: "https://www.suse.com/security/cve/CVE-2017-7226/", }, { category: "self", summary: "SUSE CVE CVE-2017-7299 page", url: "https://www.suse.com/security/cve/CVE-2017-7299/", }, { category: "self", summary: "SUSE CVE CVE-2017-7300 page", url: "https://www.suse.com/security/cve/CVE-2017-7300/", }, { category: "self", summary: "SUSE CVE CVE-2017-7301 page", url: "https://www.suse.com/security/cve/CVE-2017-7301/", }, { category: "self", summary: "SUSE CVE CVE-2017-7302 page", url: "https://www.suse.com/security/cve/CVE-2017-7302/", }, { category: "self", summary: "SUSE CVE CVE-2017-7303 page", url: "https://www.suse.com/security/cve/CVE-2017-7303/", }, { category: "self", summary: "SUSE CVE CVE-2017-7304 page", url: "https://www.suse.com/security/cve/CVE-2017-7304/", }, { category: "self", summary: "SUSE CVE CVE-2017-8392 page", url: "https://www.suse.com/security/cve/CVE-2017-8392/", }, { category: "self", summary: "SUSE CVE CVE-2017-8393 page", url: "https://www.suse.com/security/cve/CVE-2017-8393/", }, { category: "self", summary: "SUSE CVE CVE-2017-8394 page", url: "https://www.suse.com/security/cve/CVE-2017-8394/", }, { category: "self", summary: "SUSE CVE CVE-2017-8396 page", url: "https://www.suse.com/security/cve/CVE-2017-8396/", }, { category: "self", summary: "SUSE CVE CVE-2017-8421 page", url: "https://www.suse.com/security/cve/CVE-2017-8421/", }, { category: "self", summary: "SUSE CVE CVE-2017-9746 page", url: "https://www.suse.com/security/cve/CVE-2017-9746/", }, { category: "self", summary: "SUSE CVE CVE-2017-9747 page", url: "https://www.suse.com/security/cve/CVE-2017-9747/", }, { category: "self", summary: "SUSE CVE CVE-2017-9748 page", url: "https://www.suse.com/security/cve/CVE-2017-9748/", }, { category: "self", summary: "SUSE CVE CVE-2017-9750 page", url: "https://www.suse.com/security/cve/CVE-2017-9750/", }, { category: "self", summary: "SUSE CVE CVE-2017-9755 page", url: "https://www.suse.com/security/cve/CVE-2017-9755/", }, { category: "self", summary: "SUSE CVE CVE-2017-9756 page", url: "https://www.suse.com/security/cve/CVE-2017-9756/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10372 page", url: "https://www.suse.com/security/cve/CVE-2018-10372/", }, { category: "self", summary: "SUSE CVE CVE-2018-10373 page", url: "https://www.suse.com/security/cve/CVE-2018-10373/", }, { category: "self", summary: "SUSE CVE CVE-2018-10534 page", url: "https://www.suse.com/security/cve/CVE-2018-10534/", }, { category: "self", summary: "SUSE CVE CVE-2018-10535 page", url: "https://www.suse.com/security/cve/CVE-2018-10535/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, { category: "self", summary: "SUSE CVE CVE-2019-12972 page", url: "https://www.suse.com/security/cve/CVE-2019-12972/", }, { category: "self", summary: "SUSE CVE CVE-2019-14250 page", url: "https://www.suse.com/security/cve/CVE-2019-14250/", }, { category: "self", summary: "SUSE CVE CVE-2019-14444 page", url: "https://www.suse.com/security/cve/CVE-2019-14444/", }, { category: "self", summary: "SUSE CVE CVE-2019-17450 page", url: "https://www.suse.com/security/cve/CVE-2019-17450/", }, { category: "self", summary: "SUSE CVE CVE-2019-17451 page", url: "https://www.suse.com/security/cve/CVE-2019-17451/", }, { category: "self", summary: "SUSE CVE CVE-2019-9074 page", url: "https://www.suse.com/security/cve/CVE-2019-9074/", }, { category: "self", summary: "SUSE CVE CVE-2019-9075 page", url: "https://www.suse.com/security/cve/CVE-2019-9075/", }, { category: "self", summary: "SUSE CVE CVE-2019-9077 page", url: "https://www.suse.com/security/cve/CVE-2019-9077/", }, { category: "self", summary: "SUSE CVE CVE-2020-16590 page", url: "https://www.suse.com/security/cve/CVE-2020-16590/", }, { category: "self", summary: "SUSE CVE CVE-2020-16591 page", url: "https://www.suse.com/security/cve/CVE-2020-16591/", }, { category: "self", summary: "SUSE CVE CVE-2020-16592 page", url: "https://www.suse.com/security/cve/CVE-2020-16592/", }, { category: "self", summary: "SUSE CVE CVE-2020-16593 page", url: "https://www.suse.com/security/cve/CVE-2020-16593/", }, { category: "self", summary: "SUSE CVE CVE-2020-16598 page", url: "https://www.suse.com/security/cve/CVE-2020-16598/", }, { category: "self", summary: "SUSE CVE CVE-2020-16599 page", url: "https://www.suse.com/security/cve/CVE-2020-16599/", }, { category: "self", summary: "SUSE CVE CVE-2020-35448 page", url: "https://www.suse.com/security/cve/CVE-2020-35448/", }, { category: "self", summary: "SUSE CVE CVE-2020-35493 page", url: "https://www.suse.com/security/cve/CVE-2020-35493/", }, { category: "self", summary: "SUSE CVE CVE-2020-35496 page", url: "https://www.suse.com/security/cve/CVE-2020-35496/", }, { category: "self", summary: "SUSE CVE CVE-2020-35507 page", url: "https://www.suse.com/security/cve/CVE-2020-35507/", }, { category: "self", summary: "SUSE CVE CVE-2021-20197 page", url: "https://www.suse.com/security/cve/CVE-2021-20197/", }, { category: "self", summary: "SUSE CVE CVE-2021-20284 page", url: "https://www.suse.com/security/cve/CVE-2021-20284/", }, { category: "self", summary: "SUSE CVE CVE-2021-3487 page", url: "https://www.suse.com/security/cve/CVE-2021-3487/", }, ], title: "binutils-2.37-1.3 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10651-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.37-1.3.aarch64", product: { name: "binutils-2.37-1.3.aarch64", product_id: "binutils-2.37-1.3.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.aarch64", product: { name: "binutils-devel-2.37-1.3.aarch64", product_id: "binutils-devel-2.37-1.3.aarch64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.aarch64", product: { name: "binutils-devel-32bit-2.37-1.3.aarch64", product_id: "binutils-devel-32bit-2.37-1.3.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.aarch64", product: { name: "binutils-gold-2.37-1.3.aarch64", product_id: "binutils-gold-2.37-1.3.aarch64", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.aarch64", product: { name: "libctf-nobfd0-2.37-1.3.aarch64", product_id: "libctf-nobfd0-2.37-1.3.aarch64", }, }, { category: "product_version", name: "libctf0-2.37-1.3.aarch64", product: { name: "libctf0-2.37-1.3.aarch64", product_id: "libctf0-2.37-1.3.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-2.37-1.3.ppc64le", product: { name: "binutils-2.37-1.3.ppc64le", product_id: "binutils-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.ppc64le", product: { name: "binutils-devel-2.37-1.3.ppc64le", product_id: "binutils-devel-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.ppc64le", product: { name: "binutils-devel-32bit-2.37-1.3.ppc64le", product_id: "binutils-devel-32bit-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.ppc64le", product: { name: "binutils-gold-2.37-1.3.ppc64le", product_id: "binutils-gold-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.ppc64le", product: { name: "libctf-nobfd0-2.37-1.3.ppc64le", product_id: "libctf-nobfd0-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "libctf0-2.37-1.3.ppc64le", product: { name: "libctf0-2.37-1.3.ppc64le", product_id: "libctf0-2.37-1.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.37-1.3.s390x", product: { name: "binutils-2.37-1.3.s390x", product_id: "binutils-2.37-1.3.s390x", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.s390x", product: { name: "binutils-devel-2.37-1.3.s390x", product_id: "binutils-devel-2.37-1.3.s390x", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.s390x", product: { name: "binutils-devel-32bit-2.37-1.3.s390x", product_id: "binutils-devel-32bit-2.37-1.3.s390x", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.s390x", product: { name: "binutils-gold-2.37-1.3.s390x", product_id: "binutils-gold-2.37-1.3.s390x", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.s390x", product: { name: "libctf-nobfd0-2.37-1.3.s390x", product_id: "libctf-nobfd0-2.37-1.3.s390x", }, }, { category: "product_version", name: "libctf0-2.37-1.3.s390x", product: { name: "libctf0-2.37-1.3.s390x", product_id: "libctf0-2.37-1.3.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.37-1.3.x86_64", product: { name: "binutils-2.37-1.3.x86_64", product_id: "binutils-2.37-1.3.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.x86_64", product: { name: "binutils-devel-2.37-1.3.x86_64", product_id: "binutils-devel-2.37-1.3.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.x86_64", product: { name: "binutils-devel-32bit-2.37-1.3.x86_64", product_id: "binutils-devel-32bit-2.37-1.3.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.x86_64", product: { name: "binutils-gold-2.37-1.3.x86_64", product_id: "binutils-gold-2.37-1.3.x86_64", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.x86_64", product: { name: "libctf-nobfd0-2.37-1.3.x86_64", product_id: "libctf-nobfd0-2.37-1.3.x86_64", }, }, { category: "product_version", name: "libctf0-2.37-1.3.x86_64", product: { name: "libctf0-2.37-1.3.x86_64", product_id: "libctf0-2.37-1.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", }, product_reference: "binutils-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", }, product_reference: "binutils-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", }, product_reference: "binutils-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", }, product_reference: "binutils-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", }, product_reference: "binutils-devel-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", }, product_reference: "binutils-devel-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", }, product_reference: "binutils-devel-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", }, product_reference: "binutils-devel-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", }, product_reference: "binutils-devel-32bit-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", }, product_reference: "binutils-devel-32bit-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", }, product_reference: "binutils-devel-32bit-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", }, product_reference: "binutils-devel-32bit-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", }, product_reference: "binutils-gold-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", }, product_reference: "binutils-gold-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", }, product_reference: "binutils-gold-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", }, product_reference: "binutils-gold-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", }, product_reference: "libctf-nobfd0-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", }, product_reference: "libctf-nobfd0-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", }, product_reference: "libctf-nobfd0-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", }, product_reference: "libctf-nobfd0-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", }, product_reference: "libctf0-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", }, product_reference: "libctf0-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", }, product_reference: "libctf0-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", }, product_reference: "libctf0-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9939", }, ], notes: [ { category: "general", text: "ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9939", url: "https://www.suse.com/security/cve/CVE-2014-9939", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2014-9939", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2014-9939", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-9939", }, { cve: "CVE-2017-12448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12448", }, ], notes: [ { category: "general", text: "The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12448", url: "https://www.suse.com/security/cve/CVE-2017-12448", }, { category: "external", summary: "SUSE Bug 1052518 for CVE-2017-12448", url: "https://bugzilla.suse.com/1052518", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12448", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12448", }, { cve: "CVE-2017-12450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12450", }, ], notes: [ { category: "general", text: "The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12450", url: "https://www.suse.com/security/cve/CVE-2017-12450", }, { category: "external", summary: "SUSE Bug 1052514 for CVE-2017-12450", url: "https://bugzilla.suse.com/1052514", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12450", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12450", }, { cve: "CVE-2017-12452", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12452", }, ], notes: [ { category: "general", text: "The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12452", url: "https://www.suse.com/security/cve/CVE-2017-12452", }, { category: "external", summary: "SUSE Bug 1052511 for CVE-2017-12452", url: "https://bugzilla.suse.com/1052511", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12452", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12452", }, { cve: "CVE-2017-12453", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12453", }, ], notes: [ { category: "general", text: "The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12453", url: "https://www.suse.com/security/cve/CVE-2017-12453", }, { category: "external", summary: "SUSE Bug 1052509 for CVE-2017-12453", url: "https://bugzilla.suse.com/1052509", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12453", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12453", }, { cve: "CVE-2017-12454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12454", }, ], notes: [ { category: "general", text: "The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12454", url: "https://www.suse.com/security/cve/CVE-2017-12454", }, { category: "external", summary: "SUSE Bug 1052507 for CVE-2017-12454", url: "https://bugzilla.suse.com/1052507", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12454", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12454", }, { cve: "CVE-2017-12456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12456", }, ], notes: [ { category: "general", text: "The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12456", url: "https://www.suse.com/security/cve/CVE-2017-12456", }, { category: "external", summary: "SUSE Bug 1052503 for CVE-2017-12456", url: "https://bugzilla.suse.com/1052503", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12456", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12456", }, { cve: "CVE-2017-12799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12799", }, ], notes: [ { category: "general", text: "The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12799", url: "https://www.suse.com/security/cve/CVE-2017-12799", }, { category: "external", summary: "SUSE Bug 1053347 for CVE-2017-12799", url: "https://bugzilla.suse.com/1053347", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12799", }, { cve: "CVE-2017-13757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-13757", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-13757", url: "https://www.suse.com/security/cve/CVE-2017-13757", }, { category: "external", summary: "SUSE Bug 1056312 for CVE-2017-13757", url: "https://bugzilla.suse.com/1056312", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-13757", }, { cve: "CVE-2017-14128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14128", }, ], notes: [ { category: "general", text: "The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14128", url: "https://www.suse.com/security/cve/CVE-2017-14128", }, { category: "external", summary: "SUSE Bug 1057139 for CVE-2017-14128", url: "https://bugzilla.suse.com/1057139", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14128", }, { cve: "CVE-2017-14129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14129", }, ], notes: [ { category: "general", text: "The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14129", url: "https://www.suse.com/security/cve/CVE-2017-14129", }, { category: "external", summary: "SUSE Bug 1057144 for CVE-2017-14129", url: "https://bugzilla.suse.com/1057144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14129", }, { cve: "CVE-2017-14130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14130", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14130", url: "https://www.suse.com/security/cve/CVE-2017-14130", }, { category: "external", summary: "SUSE Bug 1057149 for CVE-2017-14130", url: "https://bugzilla.suse.com/1057149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14130", }, { cve: "CVE-2017-14333", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14333", }, ], notes: [ { category: "general", text: "The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during \"readelf -a\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14333", url: "https://www.suse.com/security/cve/CVE-2017-14333", }, { category: "external", summary: "SUSE Bug 1058480 for CVE-2017-14333", url: "https://bugzilla.suse.com/1058480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-14333", }, { cve: "CVE-2017-14529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14529", }, ], notes: [ { category: "general", text: "The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14529", url: "https://www.suse.com/security/cve/CVE-2017-14529", }, { category: "external", summary: "SUSE Bug 1059050 for CVE-2017-14529", url: "https://bugzilla.suse.com/1059050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14529", }, { cve: "CVE-2017-14729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14729", }, ], notes: [ { category: "general", text: "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14729", url: "https://www.suse.com/security/cve/CVE-2017-14729", }, { category: "external", summary: "SUSE Bug 1060621 for CVE-2017-14729", url: "https://bugzilla.suse.com/1060621", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-14729", }, { cve: "CVE-2017-14745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14745", }, ], notes: [ { category: "general", text: "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14745", url: "https://www.suse.com/security/cve/CVE-2017-14745", }, { category: "external", summary: "SUSE Bug 1060599 for CVE-2017-14745", url: "https://bugzilla.suse.com/1060599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-14745", }, { cve: "CVE-2017-14974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14974", }, ], notes: [ { category: "general", text: "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14974", url: "https://www.suse.com/security/cve/CVE-2017-14974", }, { category: "external", summary: "SUSE Bug 1061241 for CVE-2017-14974", url: "https://bugzilla.suse.com/1061241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14974", }, { cve: "CVE-2017-15938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15938", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15938", url: "https://www.suse.com/security/cve/CVE-2017-15938", }, { category: "external", summary: "SUSE Bug 1065693 for CVE-2017-15938", url: "https://bugzilla.suse.com/1065693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-15938", }, { cve: "CVE-2017-15939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15939", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15939", url: "https://www.suse.com/security/cve/CVE-2017-15939", }, { category: "external", summary: "SUSE Bug 1061623 for CVE-2017-15939", url: "https://bugzilla.suse.com/1061623", }, { category: "external", summary: "SUSE Bug 1065689 for CVE-2017-15939", url: "https://bugzilla.suse.com/1065689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15939", }, { cve: "CVE-2017-15996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15996", }, ], notes: [ { category: "general", text: "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15996", url: "https://www.suse.com/security/cve/CVE-2017-15996", }, { category: "external", summary: "SUSE Bug 1065643 for CVE-2017-15996", url: "https://bugzilla.suse.com/1065643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-15996", }, { cve: "CVE-2017-16826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16826", }, ], notes: [ { category: "general", text: "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16826", url: "https://www.suse.com/security/cve/CVE-2017-16826", }, { category: "external", summary: "SUSE Bug 1068640 for CVE-2017-16826", url: "https://bugzilla.suse.com/1068640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16826", }, { cve: "CVE-2017-16827", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16827", }, ], notes: [ { category: "general", text: "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16827", url: "https://www.suse.com/security/cve/CVE-2017-16827", }, { category: "external", summary: "SUSE Bug 1069202 for CVE-2017-16827", url: "https://bugzilla.suse.com/1069202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16827", }, { cve: "CVE-2017-16828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16828", }, ], notes: [ { category: "general", text: "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16828", url: "https://www.suse.com/security/cve/CVE-2017-16828", }, { category: "external", summary: "SUSE Bug 1069176 for CVE-2017-16828", url: "https://bugzilla.suse.com/1069176", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-16828", }, { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2017-16830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16830", }, ], notes: [ { category: "general", text: "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16830", url: "https://www.suse.com/security/cve/CVE-2017-16830", }, { category: "external", summary: "SUSE Bug 1068888 for CVE-2017-16830", url: "https://bugzilla.suse.com/1068888", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-16830", }, { cve: "CVE-2017-16831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16831", }, ], notes: [ { category: "general", text: "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16831", url: "https://www.suse.com/security/cve/CVE-2017-16831", }, { category: "external", summary: "SUSE Bug 1068887 for CVE-2017-16831", url: "https://bugzilla.suse.com/1068887", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16831", }, { cve: "CVE-2017-16832", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16832", }, ], notes: [ { category: "general", text: "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16832", url: "https://www.suse.com/security/cve/CVE-2017-16832", }, { category: "external", summary: "SUSE Bug 1068643 for CVE-2017-16832", url: "https://bugzilla.suse.com/1068643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16832", }, { cve: "CVE-2017-6965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6965", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6965", url: "https://www.suse.com/security/cve/CVE-2017-6965", }, { category: "external", summary: "SUSE Bug 1029909 for CVE-2017-6965", url: "https://bugzilla.suse.com/1029909", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-6965", }, { cve: "CVE-2017-6966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6966", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6966", url: "https://www.suse.com/security/cve/CVE-2017-6966", }, { category: "external", summary: "SUSE Bug 1029908 for CVE-2017-6966", url: "https://bugzilla.suse.com/1029908", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-6966", }, { cve: "CVE-2017-6969", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6969", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6969", url: "https://www.suse.com/security/cve/CVE-2017-6969", }, { category: "external", summary: "SUSE Bug 1029907 for CVE-2017-6969", url: "https://bugzilla.suse.com/1029907", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-6969", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-6969", }, { cve: "CVE-2017-7209", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7209", }, ], notes: [ { category: "general", text: "The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7209", url: "https://www.suse.com/security/cve/CVE-2017-7209", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030298 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7209", }, { cve: "CVE-2017-7210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7210", }, ], notes: [ { category: "general", text: "objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7210", url: "https://www.suse.com/security/cve/CVE-2017-7210", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030297 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7210", }, { cve: "CVE-2017-7223", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7223", }, ], notes: [ { category: "general", text: "GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7223", url: "https://www.suse.com/security/cve/CVE-2017-7223", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030589 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7223", }, { cve: "CVE-2017-7224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7224", }, ], notes: [ { category: "general", text: "The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7224", url: "https://www.suse.com/security/cve/CVE-2017-7224", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030588 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7224", }, { cve: "CVE-2017-7225", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7225", }, ], notes: [ { category: "general", text: "The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7225", url: "https://www.suse.com/security/cve/CVE-2017-7225", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030585 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030585", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7225", }, { cve: "CVE-2017-7226", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7226", }, ], notes: [ { category: "general", text: "The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7226", url: "https://www.suse.com/security/cve/CVE-2017-7226", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030584 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030584", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-7226", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-7226", }, { cve: "CVE-2017-7299", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7299", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7299", url: "https://www.suse.com/security/cve/CVE-2017-7299", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7299", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031644 for CVE-2017-7299", url: "https://bugzilla.suse.com/1031644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7299", }, { cve: "CVE-2017-7300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7300", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7300", url: "https://www.suse.com/security/cve/CVE-2017-7300", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7300", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031656 for CVE-2017-7300", url: "https://bugzilla.suse.com/1031656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-7300", }, { cve: "CVE-2017-7301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7301", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7301", url: "https://www.suse.com/security/cve/CVE-2017-7301", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7301", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031638 for CVE-2017-7301", url: "https://bugzilla.suse.com/1031638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7301", }, { cve: "CVE-2017-7302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7302", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7302", url: "https://www.suse.com/security/cve/CVE-2017-7302", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7302", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031595 for CVE-2017-7302", url: "https://bugzilla.suse.com/1031595", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7302", }, { cve: "CVE-2017-7303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7303", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7303", url: "https://www.suse.com/security/cve/CVE-2017-7303", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7303", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031593 for CVE-2017-7303", url: "https://bugzilla.suse.com/1031593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7303", }, { cve: "CVE-2017-7304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7304", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7304", url: "https://www.suse.com/security/cve/CVE-2017-7304", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7304", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031590 for CVE-2017-7304", url: "https://bugzilla.suse.com/1031590", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7304", }, { cve: "CVE-2017-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8392", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8392", url: "https://www.suse.com/security/cve/CVE-2017-8392", }, { category: "external", summary: "SUSE Bug 1037052 for CVE-2017-8392", url: "https://bugzilla.suse.com/1037052", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8392", }, { cve: "CVE-2017-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8393", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8393", url: "https://www.suse.com/security/cve/CVE-2017-8393", }, { category: "external", summary: "SUSE Bug 1037057 for CVE-2017-8393", url: "https://bugzilla.suse.com/1037057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-8393", }, { cve: "CVE-2017-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8394", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8394", url: "https://www.suse.com/security/cve/CVE-2017-8394", }, { category: "external", summary: "SUSE Bug 1037061 for CVE-2017-8394", url: "https://bugzilla.suse.com/1037061", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-8394", }, { cve: "CVE-2017-8396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8396", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8396", url: "https://www.suse.com/security/cve/CVE-2017-8396", }, { category: "external", summary: "SUSE Bug 1037066 for CVE-2017-8396", url: "https://bugzilla.suse.com/1037066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8396", }, { cve: "CVE-2017-8421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8421", }, ], notes: [ { category: "general", text: "The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8421", url: "https://www.suse.com/security/cve/CVE-2017-8421", }, { category: "external", summary: "SUSE Bug 1037273 for CVE-2017-8421", url: "https://bugzilla.suse.com/1037273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8421", }, { cve: "CVE-2017-9746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9746", }, ], notes: [ { category: "general", text: "The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9746", url: "https://www.suse.com/security/cve/CVE-2017-9746", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9746", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044891 for CVE-2017-9746", url: "https://bugzilla.suse.com/1044891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9746", }, { cve: "CVE-2017-9747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9747", }, ], notes: [ { category: "general", text: "The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9747", url: "https://www.suse.com/security/cve/CVE-2017-9747", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9747", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044897 for CVE-2017-9747", url: "https://bugzilla.suse.com/1044897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9747", }, { cve: "CVE-2017-9748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9748", }, ], notes: [ { category: "general", text: "The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9748", url: "https://www.suse.com/security/cve/CVE-2017-9748", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9748", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044901 for CVE-2017-9748", url: "https://bugzilla.suse.com/1044901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9748", }, { cve: "CVE-2017-9750", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9750", }, ], notes: [ { category: "general", text: "opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9750", url: "https://www.suse.com/security/cve/CVE-2017-9750", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9750", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044909 for CVE-2017-9750", url: "https://bugzilla.suse.com/1044909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9750", }, { cve: "CVE-2017-9755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9755", }, ], notes: [ { category: "general", text: "opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9755", url: "https://www.suse.com/security/cve/CVE-2017-9755", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9755", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044925 for CVE-2017-9755", url: "https://bugzilla.suse.com/1044925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-9755", }, { cve: "CVE-2017-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9756", }, ], notes: [ { category: "general", text: "The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9756", url: "https://www.suse.com/security/cve/CVE-2017-9756", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9756", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044927 for CVE-2017-9756", url: "https://bugzilla.suse.com/1044927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9756", }, { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-10372", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10372", }, ], notes: [ { category: "general", text: "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10372", url: "https://www.suse.com/security/cve/CVE-2018-10372", }, { category: "external", summary: "SUSE Bug 1091015 for CVE-2018-10372", url: "https://bugzilla.suse.com/1091015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-10372", }, { cve: "CVE-2018-10373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10373", }, ], notes: [ { category: "general", text: "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10373", url: "https://www.suse.com/security/cve/CVE-2018-10373", }, { category: "external", summary: "SUSE Bug 1090997 for CVE-2018-10373", url: "https://bugzilla.suse.com/1090997", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-10373", }, { cve: "CVE-2018-10534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10534", }, ], notes: [ { category: "general", text: "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10534", url: "https://www.suse.com/security/cve/CVE-2018-10534", }, { category: "external", summary: "SUSE Bug 1091368 for CVE-2018-10534", url: "https://bugzilla.suse.com/1091368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10534", }, { cve: "CVE-2018-10535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10535", }, ], notes: [ { category: "general", text: "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10535", url: "https://www.suse.com/security/cve/CVE-2018-10535", }, { category: "external", summary: "SUSE Bug 1091365 for CVE-2018-10535", url: "https://bugzilla.suse.com/1091365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-10535", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-8945", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1010180", }, { cve: "CVE-2019-12972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12972", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\\0' character.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12972", url: "https://www.suse.com/security/cve/CVE-2019-12972", }, { category: "external", summary: "SUSE Bug 1140126 for CVE-2019-12972", url: "https://bugzilla.suse.com/1140126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-12972", }, { cve: "CVE-2019-14250", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14250", }, ], notes: [ { category: "general", text: "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14250", url: "https://www.suse.com/security/cve/CVE-2019-14250", }, { category: "external", summary: "SUSE Bug 1142649 for CVE-2019-14250", url: "https://bugzilla.suse.com/1142649", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14250", }, { cve: "CVE-2019-14444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14444", }, ], notes: [ { category: "general", text: "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14444", url: "https://www.suse.com/security/cve/CVE-2019-14444", }, { category: "external", summary: "SUSE Bug 1143609 for CVE-2019-14444", url: "https://bugzilla.suse.com/1143609", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-14444", }, { cve: "CVE-2019-17450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17450", }, ], notes: [ { category: "general", text: "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17450", url: "https://www.suse.com/security/cve/CVE-2019-17450", }, { category: "external", summary: "SUSE Bug 1153770 for CVE-2019-17450", url: "https://bugzilla.suse.com/1153770", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-17450", }, { cve: "CVE-2019-17451", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17451", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17451", url: "https://www.suse.com/security/cve/CVE-2019-17451", }, { category: "external", summary: "SUSE Bug 1153768 for CVE-2019-17451", url: "https://bugzilla.suse.com/1153768", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-17451", }, { cve: "CVE-2019-9074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9074", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9074", url: "https://www.suse.com/security/cve/CVE-2019-9074", }, { category: "external", summary: "SUSE Bug 1126831 for CVE-2019-9074", url: "https://bugzilla.suse.com/1126831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9074", }, { cve: "CVE-2019-9075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9075", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9075", url: "https://www.suse.com/security/cve/CVE-2019-9075", }, { category: "external", summary: "SUSE Bug 1071544 for CVE-2019-9075", url: "https://bugzilla.suse.com/1071544", }, { category: "external", summary: "SUSE Bug 1126829 for CVE-2019-9075", url: "https://bugzilla.suse.com/1126829", }, { category: "external", summary: "SUSE Bug 1193110 for CVE-2019-9075", url: "https://bugzilla.suse.com/1193110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-9075", }, { cve: "CVE-2019-9077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9077", }, ], notes: [ { category: "general", text: "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9077", url: "https://www.suse.com/security/cve/CVE-2019-9077", }, { category: "external", summary: "SUSE Bug 1126826 for CVE-2019-9077", url: "https://bugzilla.suse.com/1126826", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9077", }, { cve: "CVE-2020-16590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16590", }, ], notes: [ { category: "general", text: "A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16590", url: "https://www.suse.com/security/cve/CVE-2020-16590", }, { category: "external", summary: "SUSE Bug 1179898 for CVE-2020-16590", url: "https://bugzilla.suse.com/1179898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-16590", }, { cve: "CVE-2020-16591", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16591", }, ], notes: [ { category: "general", text: "A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16591", url: "https://www.suse.com/security/cve/CVE-2020-16591", }, { category: "external", summary: "SUSE Bug 1179899 for CVE-2020-16591", url: "https://bugzilla.suse.com/1179899", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16591", }, { cve: "CVE-2020-16592", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16592", }, ], notes: [ { category: "general", text: "A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16592", url: "https://www.suse.com/security/cve/CVE-2020-16592", }, { category: "external", summary: "SUSE Bug 1179900 for CVE-2020-16592", url: "https://bugzilla.suse.com/1179900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16592", }, { cve: "CVE-2020-16593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16593", }, ], notes: [ { category: "general", text: "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16593", url: "https://www.suse.com/security/cve/CVE-2020-16593", }, { category: "external", summary: "SUSE Bug 1179901 for CVE-2020-16593", url: "https://bugzilla.suse.com/1179901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16593", }, { cve: "CVE-2020-16598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16598", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16598", url: "https://www.suse.com/security/cve/CVE-2020-16598", }, { category: "external", summary: "SUSE Bug 1179902 for CVE-2020-16598", url: "https://bugzilla.suse.com/1179902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16598", }, { cve: "CVE-2020-16599", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16599", }, ], notes: [ { category: "general", text: "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16599", url: "https://www.suse.com/security/cve/CVE-2020-16599", }, { category: "external", summary: "SUSE Bug 1179903 for CVE-2020-16599", url: "https://bugzilla.suse.com/1179903", }, { category: "external", summary: "SUSE Bug 1206080 for CVE-2020-16599", url: "https://bugzilla.suse.com/1206080", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-16599", }, { cve: "CVE-2020-35448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35448", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35448", url: "https://www.suse.com/security/cve/CVE-2020-35448", }, { category: "external", summary: "SUSE Bug 1184794 for CVE-2020-35448", url: "https://bugzilla.suse.com/1184794", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35448", }, { cve: "CVE-2020-35493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35493", }, ], notes: [ { category: "general", text: "A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35493", url: "https://www.suse.com/security/cve/CVE-2020-35493", }, { category: "external", summary: "SUSE Bug 1180451 for CVE-2020-35493", url: "https://bugzilla.suse.com/1180451", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35493", }, { cve: "CVE-2020-35496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35496", }, ], notes: [ { category: "general", text: "There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35496", url: "https://www.suse.com/security/cve/CVE-2020-35496", }, { category: "external", summary: "SUSE Bug 1180454 for CVE-2020-35496", url: "https://bugzilla.suse.com/1180454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35496", }, { cve: "CVE-2020-35507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35507", }, ], notes: [ { category: "general", text: "There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35507", url: "https://www.suse.com/security/cve/CVE-2020-35507", }, { category: "external", summary: "SUSE Bug 1180461 for CVE-2020-35507", url: "https://bugzilla.suse.com/1180461", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35507", }, { cve: "CVE-2021-20197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20197", }, ], notes: [ { category: "general", text: "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-20197", url: "https://www.suse.com/security/cve/CVE-2021-20197", }, { category: "external", summary: "SUSE Bug 1181452 for CVE-2021-20197", url: "https://bugzilla.suse.com/1181452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-20197", }, { cve: "CVE-2021-20284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20284", }, ], notes: [ { category: "general", text: "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-20284", url: "https://www.suse.com/security/cve/CVE-2021-20284", }, { category: "external", summary: "SUSE Bug 1183511 for CVE-2021-20284", url: "https://bugzilla.suse.com/1183511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-20284", }, { cve: "CVE-2021-3487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3487", }, ], notes: [ { category: "general", text: "** REJECT ** Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3487", url: "https://www.suse.com/security/cve/CVE-2021-3487", }, { category: "external", summary: "SUSE Bug 1184620 for CVE-2021-3487", url: "https://bugzilla.suse.com/1184620", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3487", }, ], }
opensuse-su-2019:2432-1
Vulnerability from csaf_opensuse
Published
2019-11-05 15:30
Modified
2019-11-05 15:30
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch [jsc#ECO-368].
Includes following security fixes:
- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)
- enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
(bsc#1141913).
- Fixed some LTO build issues (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section
- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).
- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).
Update to binutils 2.32:
* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
encoding of VEX.W-ignored (WIG) VEX instructions.
It also has a new -mx86-used-note=[yes|no] option to generate (or
not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
the Loongson EXTensions (EXT) instructions, the Loongson Content
Address Memory (CAM) ASE and the Loongson MultiMedia extensions
Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
limit on the maximum amount of recursion that is allowed whilst
demangling strings. This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
specifying the starting symbol for disassembly. Disassembly will
continue from this symbol up to the next symbol or the end of the
function.
* The BFD linker will now report property change in linker map file
when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
archives, unless -t is given twice. This makes it more useful
when generating a list of files that should be packaged for a
linker bug report.
* The GOLD linker has improved warning messages for relocations that
refer to discarded sections.
- Improve relro support on s390 [fate#326356]
- Fix broken debug symbols (bsc#1118644)
- Handle ELF compressed header alignment correctly.
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2019-2432
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don't check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump's --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker's -t option now doesn't report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2432", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2432-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2432-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2432-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6", }, { category: "self", summary: "SUSE Bug 1109412", url: "https://bugzilla.suse.com/1109412", }, { category: "self", summary: "SUSE Bug 1109413", url: "https://bugzilla.suse.com/1109413", }, { category: "self", summary: "SUSE Bug 1109414", url: "https://bugzilla.suse.com/1109414", }, { category: "self", summary: "SUSE Bug 1111996", url: "https://bugzilla.suse.com/1111996", }, { category: "self", summary: "SUSE Bug 1112534", url: "https://bugzilla.suse.com/1112534", }, { category: "self", summary: "SUSE Bug 1112535", url: "https://bugzilla.suse.com/1112535", }, { category: "self", summary: "SUSE Bug 1113247", url: "https://bugzilla.suse.com/1113247", }, { category: "self", summary: "SUSE Bug 1113252", url: "https://bugzilla.suse.com/1113252", }, { category: "self", summary: "SUSE Bug 1113255", url: "https://bugzilla.suse.com/1113255", }, { category: "self", summary: "SUSE Bug 1116827", url: "https://bugzilla.suse.com/1116827", }, { category: "self", summary: "SUSE Bug 1118644", url: "https://bugzilla.suse.com/1118644", }, { category: "self", summary: "SUSE Bug 1118830", url: "https://bugzilla.suse.com/1118830", }, { category: "self", summary: "SUSE Bug 1118831", url: "https://bugzilla.suse.com/1118831", }, { category: "self", summary: "SUSE Bug 1120640", url: "https://bugzilla.suse.com/1120640", }, { category: "self", summary: "SUSE Bug 1121034", url: "https://bugzilla.suse.com/1121034", }, { category: "self", summary: "SUSE Bug 1121035", url: "https://bugzilla.suse.com/1121035", }, { category: "self", summary: "SUSE Bug 1121056", url: "https://bugzilla.suse.com/1121056", }, { category: "self", summary: "SUSE Bug 1133131", url: "https://bugzilla.suse.com/1133131", }, { category: "self", summary: "SUSE Bug 1133232", url: "https://bugzilla.suse.com/1133232", }, { category: "self", summary: "SUSE Bug 1141913", url: "https://bugzilla.suse.com/1141913", }, { category: "self", summary: "SUSE Bug 1142772", url: "https://bugzilla.suse.com/1142772", }, { category: "self", summary: "SUSE Bug 1152590", url: "https://bugzilla.suse.com/1152590", }, { category: "self", summary: "SUSE Bug 1154016", url: "https://bugzilla.suse.com/1154016", }, { category: "self", summary: "SUSE Bug 1154025", url: "https://bugzilla.suse.com/1154025", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2019-11-05T15:30:18Z", generator: { date: "2019-11-05T15:30:18Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2432-1", initial_release_date: "2019-11-05T15:30:18Z", revision_history: [ { date: "2019-11-05T15:30:18Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.32-lp151.3.3.1.i586", product: { name: "binutils-2.32-lp151.3.3.1.i586", product_id: "binutils-2.32-lp151.3.3.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.32-lp151.3.3.1.i586", product: { name: "binutils-devel-2.32-lp151.3.3.1.i586", product_id: "binutils-devel-2.32-lp151.3.3.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.32-lp151.3.3.1.i586", product: { name: "binutils-gold-2.32-lp151.3.3.1.i586", product_id: "binutils-gold-2.32-lp151.3.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.32-lp151.3.3.1.x86_64", product: { name: "binutils-2.32-lp151.3.3.1.x86_64", product_id: "binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.32-lp151.3.3.1.x86_64", product: { name: "binutils-devel-2.32-lp151.3.3.1.x86_64", product_id: "binutils-devel-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", product: { name: "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", product_id: "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.32-lp151.3.3.1.x86_64", product: { name: "binutils-gold-2.32-lp151.3.3.1.x86_64", product_id: "binutils-gold-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-arm-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-arm-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-avr-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-avr-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-i386-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-i386-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-mips-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-mips-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-rx-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-rx-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-s390-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-s390-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-lp151.3.3.1.x86_64", product: { name: "cross-spu-binutils-2.32-lp151.3.3.1.x86_64", product_id: "cross-spu-binutils-2.32-lp151.3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.32-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", }, product_reference: "binutils-2.32-lp151.3.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", }, product_reference: "binutils-devel-2.32-lp151.3.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", }, product_reference: "binutils-devel-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", }, product_reference: "binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", }, product_reference: "binutils-gold-2.32-lp151.3.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", }, product_reference: "binutils-gold-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-arm-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-avr-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-i386-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-mips-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-rx-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-s390-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", }, product_reference: "cross-spu-binutils-2.32-lp151.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "low", }, ], title: "CVE-2018-8945", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-devel-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-devel-32bit-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.i586", "openSUSE Leap 15.1:binutils-gold-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-aarch64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-arm-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-avr-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-epiphany-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-hppa64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-i386-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ia64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-m68k-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-mips-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-ppc64le-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-riscv64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-rx-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-s390x-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-sparc64-binutils-2.32-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:cross-spu-binutils-2.32-lp151.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-05T15:30:18Z", details: "important", }, ], title: "CVE-2019-1010180", }, ], }
opensuse-su-2019:2415-1
Vulnerability from csaf_opensuse
Published
2019-10-30 17:25
Modified
2019-10-30 17:25
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch [jsc#ECO-368].
Includes following security fixes:
- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)
- enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
(bsc#1141913).
- Fixed some LTO build issues (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section
- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).
- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).
Update to binutils 2.32:
* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
encoding of VEX.W-ignored (WIG) VEX instructions.
It also has a new -mx86-used-note=[yes|no] option to generate (or
not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
the Loongson EXTensions (EXT) instructions, the Loongson Content
Address Memory (CAM) ASE and the Loongson MultiMedia extensions
Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
limit on the maximum amount of recursion that is allowed whilst
demangling strings. This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
specifying the starting symbol for disassembly. Disassembly will
continue from this symbol up to the next symbol or the end of the
function.
* The BFD linker will now report property change in linker map file
when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
archives, unless -t is given twice. This makes it more useful
when generating a list of files that should be packaged for a
linker bug report.
* The GOLD linker has improved warning messages for relocations that
refer to discarded sections.
- Improve relro support on s390 [fate#326356]
- Fix broken debug symbols (bsc#1118644)
- Handle ELF compressed header alignment correctly.
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2415
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don't check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump's --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker's -t option now doesn't report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2415", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2415-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2415-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2415-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN", }, { category: "self", summary: "SUSE Bug 1109412", url: "https://bugzilla.suse.com/1109412", }, { category: "self", summary: "SUSE Bug 1109413", url: "https://bugzilla.suse.com/1109413", }, { category: "self", summary: "SUSE Bug 1109414", url: "https://bugzilla.suse.com/1109414", }, { category: "self", summary: "SUSE Bug 1111996", url: "https://bugzilla.suse.com/1111996", }, { category: "self", summary: "SUSE Bug 1112534", url: "https://bugzilla.suse.com/1112534", }, { category: "self", summary: "SUSE Bug 1112535", url: "https://bugzilla.suse.com/1112535", }, { category: "self", summary: "SUSE Bug 1113247", url: "https://bugzilla.suse.com/1113247", }, { category: "self", summary: "SUSE Bug 1113252", url: "https://bugzilla.suse.com/1113252", }, { category: "self", summary: "SUSE Bug 1113255", url: "https://bugzilla.suse.com/1113255", }, { category: "self", summary: "SUSE Bug 1116827", url: "https://bugzilla.suse.com/1116827", }, { category: "self", summary: "SUSE Bug 1118644", url: "https://bugzilla.suse.com/1118644", }, { category: "self", summary: "SUSE Bug 1118830", url: "https://bugzilla.suse.com/1118830", }, { category: "self", summary: "SUSE Bug 1118831", url: "https://bugzilla.suse.com/1118831", }, { category: "self", summary: "SUSE Bug 1120640", url: "https://bugzilla.suse.com/1120640", }, { category: "self", summary: "SUSE Bug 1121034", url: "https://bugzilla.suse.com/1121034", }, { category: "self", summary: "SUSE Bug 1121035", url: "https://bugzilla.suse.com/1121035", }, { category: "self", summary: "SUSE Bug 1121056", url: "https://bugzilla.suse.com/1121056", }, { category: "self", summary: "SUSE Bug 1133131", url: "https://bugzilla.suse.com/1133131", }, { category: "self", summary: "SUSE Bug 1133232", url: "https://bugzilla.suse.com/1133232", }, { category: "self", summary: "SUSE Bug 1141913", url: "https://bugzilla.suse.com/1141913", }, { category: "self", summary: "SUSE Bug 1142772", url: "https://bugzilla.suse.com/1142772", }, { category: "self", summary: "SUSE Bug 1152590", url: "https://bugzilla.suse.com/1152590", }, { category: "self", summary: "SUSE Bug 1154016", url: "https://bugzilla.suse.com/1154016", }, { category: "self", summary: "SUSE Bug 1154025", url: "https://bugzilla.suse.com/1154025", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2019-10-30T17:25:53Z", generator: { date: "2019-10-30T17:25:53Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2415-1", initial_release_date: "2019-10-30T17:25:53Z", revision_history: [ { date: "2019-10-30T17:25:53Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.32-lp150.10.1.i586", product: { name: "binutils-2.32-lp150.10.1.i586", product_id: "binutils-2.32-lp150.10.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.32-lp150.10.1.i586", product: { name: "binutils-devel-2.32-lp150.10.1.i586", product_id: "binutils-devel-2.32-lp150.10.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.32-lp150.10.1.i586", product: { name: "binutils-gold-2.32-lp150.10.1.i586", product_id: "binutils-gold-2.32-lp150.10.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.32-lp150.10.1.x86_64", product: { name: "binutils-2.32-lp150.10.1.x86_64", product_id: "binutils-2.32-lp150.10.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.32-lp150.10.1.x86_64", product: { name: "binutils-devel-2.32-lp150.10.1.x86_64", product_id: "binutils-devel-2.32-lp150.10.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.32-lp150.10.1.x86_64", product: { name: "binutils-devel-32bit-2.32-lp150.10.1.x86_64", product_id: "binutils-devel-32bit-2.32-lp150.10.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.32-lp150.10.1.x86_64", product: { name: "binutils-gold-2.32-lp150.10.1.x86_64", product_id: "binutils-gold-2.32-lp150.10.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.32-lp150.10.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", }, product_reference: "binutils-2.32-lp150.10.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", }, product_reference: "binutils-2.32-lp150.10.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-lp150.10.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", }, product_reference: "binutils-devel-2.32-lp150.10.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", }, product_reference: "binutils-devel-2.32-lp150.10.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", }, product_reference: "binutils-devel-32bit-2.32-lp150.10.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-lp150.10.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", }, product_reference: "binutils-gold-2.32-lp150.10.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-lp150.10.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", }, product_reference: "binutils-gold-2.32-lp150.10.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "low", }, ], title: "CVE-2018-8945", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-devel-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-devel-32bit-2.32-lp150.10.1.x86_64", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.i586", "openSUSE Leap 15.0:binutils-gold-2.32-lp150.10.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-30T17:25:53Z", details: "important", }, ], title: "CVE-2019-1010180", }, ], }
suse-su-2019:2650-1
Vulnerability from csaf_suse
Published
2019-10-14 08:53
Modified
2019-10-14 08:53
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:
Includes the following security fixes:
- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)
- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
(bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section
Update to binutils 2.32:
* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
encoding of VEX.W-ignored (WIG) VEX instructions.
It also has a new -mx86-used-note=[yes|no] option to generate (or
not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
the Loongson EXTensions (EXT) instructions, the Loongson Content
Address Memory (CAM) ASE and the Loongson MultiMedia extensions
Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
limit on the maximum amount of recursion that is allowed whilst
demangling strings. This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
specifying the starting symbol for disassembly. Disassembly will
continue from this symbol up to the next symbol or the end of the
function.
* The BFD linker will now report property change in linker map file
when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
archives, unless -t is given twice. This makes it more useful
when generating a list of files that should be packaged for a
linker bug report.
* The GOLD linker has improved warning messages for relocations that
refer to discarded sections.
- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.
Patchnames
HPE-Helion-OpenStack-8-2019-2650,SUSE-2019-2650,SUSE-OpenStack-Cloud-7-2019-2650,SUSE-OpenStack-Cloud-8-2019-2650,SUSE-OpenStack-Cloud-Crowbar-8-2019-2650,SUSE-SLE-DESKTOP-12-SP4-2019-2650,SUSE-SLE-DESKTOP-12-SP5-2019-2650,SUSE-SLE-SAP-12-SP1-2019-2650,SUSE-SLE-SAP-12-SP2-2019-2650,SUSE-SLE-SAP-12-SP3-2019-2650,SUSE-SLE-SDK-12-SP4-2019-2650,SUSE-SLE-SDK-12-SP5-2019-2650,SUSE-SLE-SERVER-12-SP1-2019-2650,SUSE-SLE-SERVER-12-SP2-2019-2650,SUSE-SLE-SERVER-12-SP2-BCL-2019-2650,SUSE-SLE-SERVER-12-SP3-2019-2650,SUSE-SLE-SERVER-12-SP3-BCL-2019-2650,SUSE-SLE-SERVER-12-SP4-2019-2650,SUSE-SLE-SERVER-12-SP5-2019-2650,SUSE-Storage-4-2019-2650,SUSE-Storage-5-2019-2650
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:\n\nIncludes the following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- Enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO problems (bsc#1133131 bsc#1133232).\n- riscv: Don't check ABI flags if no code section\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes.\n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump's --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker's -t option now doesn't report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Handle ELF compressed header alignment correctly.\n\n ", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2019-2650,SUSE-2019-2650,SUSE-OpenStack-Cloud-7-2019-2650,SUSE-OpenStack-Cloud-8-2019-2650,SUSE-OpenStack-Cloud-Crowbar-8-2019-2650,SUSE-SLE-DESKTOP-12-SP4-2019-2650,SUSE-SLE-DESKTOP-12-SP5-2019-2650,SUSE-SLE-SAP-12-SP1-2019-2650,SUSE-SLE-SAP-12-SP2-2019-2650,SUSE-SLE-SAP-12-SP3-2019-2650,SUSE-SLE-SDK-12-SP4-2019-2650,SUSE-SLE-SDK-12-SP5-2019-2650,SUSE-SLE-SERVER-12-SP1-2019-2650,SUSE-SLE-SERVER-12-SP2-2019-2650,SUSE-SLE-SERVER-12-SP2-BCL-2019-2650,SUSE-SLE-SERVER-12-SP3-2019-2650,SUSE-SLE-SERVER-12-SP3-BCL-2019-2650,SUSE-SLE-SERVER-12-SP4-2019-2650,SUSE-SLE-SERVER-12-SP5-2019-2650,SUSE-Storage-4-2019-2650,SUSE-Storage-5-2019-2650", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2650-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:2650-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:2650-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html", }, { category: "self", summary: "SUSE Bug 1109412", url: "https://bugzilla.suse.com/1109412", }, { category: "self", summary: "SUSE Bug 1109413", url: "https://bugzilla.suse.com/1109413", }, { category: "self", summary: "SUSE Bug 1109414", url: "https://bugzilla.suse.com/1109414", }, { category: "self", summary: "SUSE Bug 1111996", url: "https://bugzilla.suse.com/1111996", }, { category: "self", summary: "SUSE Bug 1112534", url: "https://bugzilla.suse.com/1112534", }, { category: "self", summary: "SUSE Bug 1112535", url: "https://bugzilla.suse.com/1112535", }, { category: "self", summary: "SUSE Bug 1113247", url: "https://bugzilla.suse.com/1113247", }, { category: "self", summary: "SUSE Bug 1113252", url: "https://bugzilla.suse.com/1113252", }, { category: "self", summary: "SUSE Bug 1113255", url: "https://bugzilla.suse.com/1113255", }, { category: "self", summary: "SUSE Bug 1116827", url: "https://bugzilla.suse.com/1116827", }, { category: "self", summary: "SUSE Bug 1118830", url: "https://bugzilla.suse.com/1118830", }, { category: "self", summary: "SUSE Bug 1118831", url: "https://bugzilla.suse.com/1118831", }, { category: "self", summary: "SUSE Bug 1120640", url: "https://bugzilla.suse.com/1120640", }, { category: "self", summary: "SUSE Bug 1121034", url: "https://bugzilla.suse.com/1121034", }, { category: "self", summary: "SUSE Bug 1121035", url: "https://bugzilla.suse.com/1121035", }, { category: "self", summary: "SUSE Bug 1121056", url: "https://bugzilla.suse.com/1121056", }, { category: "self", summary: "SUSE Bug 1133131", url: "https://bugzilla.suse.com/1133131", }, { category: "self", summary: "SUSE Bug 1133232", url: "https://bugzilla.suse.com/1133232", }, { category: "self", summary: "SUSE Bug 1141913", url: "https://bugzilla.suse.com/1141913", }, { category: "self", summary: "SUSE Bug 1142772", url: "https://bugzilla.suse.com/1142772", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, { category: "self", summary: "SUSE Bug ECO-368", url: "https://bugzilla.suse.com/ECO-368", }, { category: "self", summary: "SUSE Bug SLE-6206", url: "https://bugzilla.suse.com/SLE-6206", }, ], title: "Security update for binutils", tracking: { current_release_date: "2019-10-14T08:53:28Z", generator: { date: "2019-10-14T08:53:28Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:2650-1", initial_release_date: "2019-10-14T08:53:28Z", revision_history: [ { date: "2019-10-14T08:53:28Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.32-9.33.1.aarch64", product: { name: "binutils-2.32-9.33.1.aarch64", product_id: "binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.32-9.33.1.aarch64", product: { name: "binutils-devel-2.32-9.33.1.aarch64", product_id: "binutils-devel-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.32-9.33.1.aarch64", product: { name: "binutils-gold-2.32-9.33.1.aarch64", product_id: "binutils-gold-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-9.33.1.aarch64", product: { name: "cross-arm-binutils-2.32-9.33.1.aarch64", product_id: "cross-arm-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-9.33.1.aarch64", product: { name: "cross-avr-binutils-2.32-9.33.1.aarch64", product_id: "cross-avr-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-9.33.1.aarch64", product: { name: "cross-hppa-binutils-2.32-9.33.1.aarch64", product_id: "cross-hppa-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-9.33.1.aarch64", product: { name: "cross-hppa64-binutils-2.32-9.33.1.aarch64", product_id: "cross-hppa64-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-9.33.1.aarch64", product: { name: "cross-i386-binutils-2.32-9.33.1.aarch64", product_id: "cross-i386-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-9.33.1.aarch64", product: { name: "cross-ia64-binutils-2.32-9.33.1.aarch64", product_id: "cross-ia64-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-9.33.1.aarch64", product: { name: "cross-m68k-binutils-2.32-9.33.1.aarch64", product_id: "cross-m68k-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-9.33.1.aarch64", product: { name: "cross-mips-binutils-2.32-9.33.1.aarch64", product_id: "cross-mips-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-9.33.1.aarch64", product: { name: "cross-ppc-binutils-2.32-9.33.1.aarch64", product_id: "cross-ppc-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-9.33.1.aarch64", product: { name: "cross-ppc64-binutils-2.32-9.33.1.aarch64", product_id: "cross-ppc64-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-9.33.1.aarch64", product: { name: "cross-ppc64le-binutils-2.32-9.33.1.aarch64", product_id: "cross-ppc64le-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-9.33.1.aarch64", product: { name: "cross-s390-binutils-2.32-9.33.1.aarch64", product_id: "cross-s390-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-9.33.1.aarch64", product: { name: "cross-s390x-binutils-2.32-9.33.1.aarch64", product_id: "cross-s390x-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-9.33.1.aarch64", product: { name: "cross-sparc-binutils-2.32-9.33.1.aarch64", product_id: "cross-sparc-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-9.33.1.aarch64", product: { name: "cross-sparc64-binutils-2.32-9.33.1.aarch64", product_id: "cross-sparc64-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-9.33.1.aarch64", product: { name: "cross-spu-binutils-2.32-9.33.1.aarch64", product_id: "cross-spu-binutils-2.32-9.33.1.aarch64", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-9.33.1.aarch64", product: { name: "cross-x86_64-binutils-2.32-9.33.1.aarch64", product_id: "cross-x86_64-binutils-2.32-9.33.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-devel-64bit-2.32-9.33.1.aarch64_ilp32", product: { name: "binutils-devel-64bit-2.32-9.33.1.aarch64_ilp32", product_id: "binutils-devel-64bit-2.32-9.33.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "binutils-2.32-9.33.1.i586", product: { name: "binutils-2.32-9.33.1.i586", product_id: "binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.32-9.33.1.i586", product: { name: "binutils-devel-2.32-9.33.1.i586", product_id: "binutils-devel-2.32-9.33.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.32-9.33.1.i586", product: { name: "binutils-gold-2.32-9.33.1.i586", product_id: "binutils-gold-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-9.33.1.i586", product: { name: "cross-aarch64-binutils-2.32-9.33.1.i586", product_id: "cross-aarch64-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-9.33.1.i586", product: { name: "cross-arm-binutils-2.32-9.33.1.i586", product_id: "cross-arm-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-9.33.1.i586", product: { name: "cross-avr-binutils-2.32-9.33.1.i586", product_id: "cross-avr-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-9.33.1.i586", product: { name: "cross-hppa-binutils-2.32-9.33.1.i586", product_id: "cross-hppa-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-9.33.1.i586", product: { name: "cross-hppa64-binutils-2.32-9.33.1.i586", product_id: "cross-hppa64-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-9.33.1.i586", product: { name: "cross-ia64-binutils-2.32-9.33.1.i586", product_id: "cross-ia64-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-9.33.1.i586", product: { name: "cross-m68k-binutils-2.32-9.33.1.i586", product_id: "cross-m68k-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-9.33.1.i586", product: { name: "cross-mips-binutils-2.32-9.33.1.i586", product_id: "cross-mips-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-9.33.1.i586", product: { name: "cross-ppc-binutils-2.32-9.33.1.i586", product_id: "cross-ppc-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-9.33.1.i586", product: { name: "cross-ppc64-binutils-2.32-9.33.1.i586", product_id: "cross-ppc64-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-9.33.1.i586", product: { name: "cross-ppc64le-binutils-2.32-9.33.1.i586", product_id: "cross-ppc64le-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-9.33.1.i586", product: { name: "cross-s390-binutils-2.32-9.33.1.i586", product_id: "cross-s390-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-9.33.1.i586", product: { name: "cross-s390x-binutils-2.32-9.33.1.i586", product_id: "cross-s390x-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-9.33.1.i586", product: { name: "cross-sparc-binutils-2.32-9.33.1.i586", product_id: "cross-sparc-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-9.33.1.i586", product: { name: "cross-sparc64-binutils-2.32-9.33.1.i586", product_id: "cross-sparc64-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-9.33.1.i586", product: { name: "cross-spu-binutils-2.32-9.33.1.i586", product_id: "cross-spu-binutils-2.32-9.33.1.i586", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-9.33.1.i586", product: { name: "cross-x86_64-binutils-2.32-9.33.1.i586", product_id: "cross-x86_64-binutils-2.32-9.33.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.32-9.33.1.ppc64le", product: { name: "binutils-2.32-9.33.1.ppc64le", product_id: "binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.32-9.33.1.ppc64le", product: { name: "binutils-devel-2.32-9.33.1.ppc64le", product_id: "binutils-devel-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.32-9.33.1.ppc64le", product: { name: "binutils-gold-2.32-9.33.1.ppc64le", product_id: "binutils-gold-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-aarch64-binutils-2.32-9.33.1.ppc64le", product_id: "cross-aarch64-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-arm-binutils-2.32-9.33.1.ppc64le", product_id: "cross-arm-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-avr-binutils-2.32-9.33.1.ppc64le", product_id: "cross-avr-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-hppa-binutils-2.32-9.33.1.ppc64le", product_id: "cross-hppa-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-hppa64-binutils-2.32-9.33.1.ppc64le", product_id: "cross-hppa64-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-i386-binutils-2.32-9.33.1.ppc64le", product_id: "cross-i386-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-ia64-binutils-2.32-9.33.1.ppc64le", product_id: "cross-ia64-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-m68k-binutils-2.32-9.33.1.ppc64le", product_id: "cross-m68k-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-mips-binutils-2.32-9.33.1.ppc64le", product_id: "cross-mips-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-ppc-binutils-2.32-9.33.1.ppc64le", product_id: "cross-ppc-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-ppc64-binutils-2.32-9.33.1.ppc64le", product_id: "cross-ppc64-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-s390-binutils-2.32-9.33.1.ppc64le", product_id: "cross-s390-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-s390x-binutils-2.32-9.33.1.ppc64le", product_id: "cross-s390x-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-sparc-binutils-2.32-9.33.1.ppc64le", product_id: "cross-sparc-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-sparc64-binutils-2.32-9.33.1.ppc64le", product_id: "cross-sparc64-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-spu-binutils-2.32-9.33.1.ppc64le", product_id: "cross-spu-binutils-2.32-9.33.1.ppc64le", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-9.33.1.ppc64le", product: { name: "cross-x86_64-binutils-2.32-9.33.1.ppc64le", product_id: "cross-x86_64-binutils-2.32-9.33.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.32-9.33.1.s390", product: { name: "binutils-2.32-9.33.1.s390", product_id: "binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "binutils-devel-2.32-9.33.1.s390", product: { name: "binutils-devel-2.32-9.33.1.s390", product_id: "binutils-devel-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-9.33.1.s390", product: { name: "cross-aarch64-binutils-2.32-9.33.1.s390", product_id: "cross-aarch64-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-9.33.1.s390", product: { name: "cross-arm-binutils-2.32-9.33.1.s390", product_id: "cross-arm-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-9.33.1.s390", product: { name: "cross-avr-binutils-2.32-9.33.1.s390", product_id: "cross-avr-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-9.33.1.s390", product: { name: "cross-hppa-binutils-2.32-9.33.1.s390", product_id: "cross-hppa-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-9.33.1.s390", product: { name: "cross-hppa64-binutils-2.32-9.33.1.s390", product_id: "cross-hppa64-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-9.33.1.s390", product: { name: "cross-i386-binutils-2.32-9.33.1.s390", product_id: "cross-i386-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-9.33.1.s390", product: { name: "cross-ia64-binutils-2.32-9.33.1.s390", product_id: "cross-ia64-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-9.33.1.s390", product: { name: "cross-m68k-binutils-2.32-9.33.1.s390", product_id: "cross-m68k-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-9.33.1.s390", product: { name: "cross-mips-binutils-2.32-9.33.1.s390", product_id: "cross-mips-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-9.33.1.s390", product: { name: "cross-ppc-binutils-2.32-9.33.1.s390", product_id: "cross-ppc-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-9.33.1.s390", product: { name: "cross-ppc64-binutils-2.32-9.33.1.s390", product_id: "cross-ppc64-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-9.33.1.s390", product: { name: "cross-ppc64le-binutils-2.32-9.33.1.s390", product_id: "cross-ppc64le-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-9.33.1.s390", product: { name: "cross-s390x-binutils-2.32-9.33.1.s390", product_id: "cross-s390x-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-9.33.1.s390", product: { name: "cross-sparc-binutils-2.32-9.33.1.s390", product_id: "cross-sparc-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-9.33.1.s390", product: { name: "cross-sparc64-binutils-2.32-9.33.1.s390", product_id: "cross-sparc64-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-9.33.1.s390", product: { name: "cross-spu-binutils-2.32-9.33.1.s390", product_id: "cross-spu-binutils-2.32-9.33.1.s390", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-9.33.1.s390", product: { name: "cross-x86_64-binutils-2.32-9.33.1.s390", product_id: "cross-x86_64-binutils-2.32-9.33.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "binutils-2.32-9.33.1.s390x", product: { name: "binutils-2.32-9.33.1.s390x", product_id: "binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.32-9.33.1.s390x", product: { name: "binutils-devel-2.32-9.33.1.s390x", product_id: "binutils-devel-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "binutils-devel-32bit-2.32-9.33.1.s390x", product: { name: "binutils-devel-32bit-2.32-9.33.1.s390x", product_id: "binutils-devel-32bit-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "binutils-gold-2.32-9.33.1.s390x", product: { name: "binutils-gold-2.32-9.33.1.s390x", product_id: "binutils-gold-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-9.33.1.s390x", product: { name: "cross-aarch64-binutils-2.32-9.33.1.s390x", product_id: "cross-aarch64-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-9.33.1.s390x", product: { name: "cross-arm-binutils-2.32-9.33.1.s390x", product_id: "cross-arm-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-9.33.1.s390x", product: { name: "cross-avr-binutils-2.32-9.33.1.s390x", product_id: "cross-avr-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-9.33.1.s390x", product: { name: "cross-hppa-binutils-2.32-9.33.1.s390x", product_id: "cross-hppa-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-9.33.1.s390x", product: { name: "cross-hppa64-binutils-2.32-9.33.1.s390x", product_id: "cross-hppa64-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-9.33.1.s390x", product: { name: "cross-i386-binutils-2.32-9.33.1.s390x", product_id: "cross-i386-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-9.33.1.s390x", product: { name: "cross-ia64-binutils-2.32-9.33.1.s390x", product_id: "cross-ia64-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-9.33.1.s390x", product: { name: "cross-m68k-binutils-2.32-9.33.1.s390x", product_id: "cross-m68k-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-9.33.1.s390x", product: { name: "cross-mips-binutils-2.32-9.33.1.s390x", product_id: "cross-mips-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-9.33.1.s390x", product: { name: "cross-ppc-binutils-2.32-9.33.1.s390x", product_id: "cross-ppc-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-9.33.1.s390x", product: { name: "cross-ppc64-binutils-2.32-9.33.1.s390x", product_id: "cross-ppc64-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-9.33.1.s390x", product: { name: "cross-ppc64le-binutils-2.32-9.33.1.s390x", product_id: "cross-ppc64le-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-9.33.1.s390x", product: { name: "cross-s390-binutils-2.32-9.33.1.s390x", product_id: "cross-s390-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-9.33.1.s390x", product: { name: "cross-sparc-binutils-2.32-9.33.1.s390x", product_id: "cross-sparc-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-9.33.1.s390x", product: { name: "cross-sparc64-binutils-2.32-9.33.1.s390x", product_id: "cross-sparc64-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-9.33.1.s390x", product: { name: "cross-spu-binutils-2.32-9.33.1.s390x", product_id: "cross-spu-binutils-2.32-9.33.1.s390x", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-9.33.1.s390x", product: { name: "cross-x86_64-binutils-2.32-9.33.1.s390x", product_id: "cross-x86_64-binutils-2.32-9.33.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.32-9.33.1.x86_64", product: { name: "binutils-2.32-9.33.1.x86_64", product_id: "binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.32-9.33.1.x86_64", product: { name: "binutils-devel-2.32-9.33.1.x86_64", product_id: "binutils-devel-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.32-9.33.1.x86_64", product: { name: "binutils-devel-32bit-2.32-9.33.1.x86_64", product_id: "binutils-devel-32bit-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.32-9.33.1.x86_64", product: { name: "binutils-gold-2.32-9.33.1.x86_64", product_id: "binutils-gold-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-9.33.1.x86_64", product: { name: "cross-aarch64-binutils-2.32-9.33.1.x86_64", product_id: "cross-aarch64-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-9.33.1.x86_64", product: { name: "cross-arm-binutils-2.32-9.33.1.x86_64", product_id: "cross-arm-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-9.33.1.x86_64", product: { name: "cross-avr-binutils-2.32-9.33.1.x86_64", product_id: "cross-avr-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-9.33.1.x86_64", product: { name: "cross-hppa-binutils-2.32-9.33.1.x86_64", product_id: "cross-hppa-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-9.33.1.x86_64", product: { name: "cross-hppa64-binutils-2.32-9.33.1.x86_64", product_id: "cross-hppa64-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-9.33.1.x86_64", product: { name: "cross-i386-binutils-2.32-9.33.1.x86_64", product_id: "cross-i386-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-9.33.1.x86_64", product: { name: "cross-ia64-binutils-2.32-9.33.1.x86_64", product_id: "cross-ia64-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-9.33.1.x86_64", product: { name: "cross-m68k-binutils-2.32-9.33.1.x86_64", product_id: "cross-m68k-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-9.33.1.x86_64", product: { name: "cross-mips-binutils-2.32-9.33.1.x86_64", product_id: "cross-mips-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-9.33.1.x86_64", product: { name: "cross-ppc-binutils-2.32-9.33.1.x86_64", product_id: "cross-ppc-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-9.33.1.x86_64", product: { name: "cross-ppc64-binutils-2.32-9.33.1.x86_64", product_id: "cross-ppc64-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-9.33.1.x86_64", product: { name: "cross-ppc64le-binutils-2.32-9.33.1.x86_64", product_id: "cross-ppc64le-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-9.33.1.x86_64", product: { name: "cross-s390-binutils-2.32-9.33.1.x86_64", product_id: "cross-s390-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-9.33.1.x86_64", product: { name: "cross-s390x-binutils-2.32-9.33.1.x86_64", product_id: "cross-s390x-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-9.33.1.x86_64", product: { name: "cross-sparc-binutils-2.32-9.33.1.x86_64", product_id: "cross-sparc-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-9.33.1.x86_64", product: { name: "cross-sparc64-binutils-2.32-9.33.1.x86_64", product_id: "cross-sparc64-binutils-2.32-9.33.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-9.33.1.x86_64", product: { name: "cross-spu-binutils-2.32-9.33.1.x86_64", product_id: "cross-spu-binutils-2.32-9.33.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 5", product: { name: "SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5", product_identification_helper: { cpe: "cpe:/o:suse:ses:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", }, product_reference: "binutils-devel-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", }, product_reference: "binutils-devel-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", }, product_reference: "binutils-devel-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", }, product_reference: "binutils-devel-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", }, product_reference: "binutils-devel-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", }, product_reference: "binutils-gold-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", }, product_reference: "binutils-gold-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", }, product_reference: "binutils-gold-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", }, product_reference: "binutils-gold-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", }, product_reference: "cross-spu-binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", }, product_reference: "cross-spu-binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", }, product_reference: "cross-spu-binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", }, product_reference: "cross-spu-binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", }, product_reference: "binutils-devel-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", }, product_reference: "binutils-devel-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", }, product_reference: "binutils-devel-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", }, product_reference: "binutils-gold-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", }, product_reference: "binutils-gold-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", }, product_reference: "binutils-gold-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", }, product_reference: "binutils-gold-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", }, product_reference: "cross-ppc-binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", }, product_reference: "cross-spu-binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", }, product_reference: "cross-spu-binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", }, product_reference: "cross-spu-binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", }, product_reference: "cross-spu-binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", }, product_reference: "binutils-devel-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", }, product_reference: "binutils-devel-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", }, product_reference: "binutils-devel-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", }, product_reference: "binutils-devel-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", }, product_reference: "binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", }, product_reference: "binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", }, product_reference: "binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", }, product_reference: "binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", }, product_reference: "binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", }, product_reference: "binutils-2.32-9.33.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", }, product_reference: "binutils-2.32-9.33.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-9.33.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", }, product_reference: "binutils-devel-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", }, product_reference: "binutils-2.32-9.33.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-9.33.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", }, product_reference: "binutils-2.32-9.33.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "HPE Helion OpenStack 8:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.aarch64", "SUSE Enterprise Storage 5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.32-9.33.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.s390x", "SUSE OpenStack Cloud 7:binutils-devel-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud 8:binutils-2.32-9.33.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:binutils-2.32-9.33.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-14T08:53:28Z", details: "important", }, ], title: "CVE-2019-1010180", }, ], }
suse-su-2019:2780-1
Vulnerability from csaf_suse
Published
2019-10-25 12:25
Modified
2019-10-25 12:25
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch [jsc#ECO-368].
Includes following security fixes:
- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)
- enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
(bsc#1141913).
- Fixed some LTO build issues (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section
- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).
- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).
Update to binutils 2.32:
* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
encoding of VEX.W-ignored (WIG) VEX instructions.
It also has a new -mx86-used-note=[yes|no] option to generate (or
not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
the Loongson EXTensions (EXT) instructions, the Loongson Content
Address Memory (CAM) ASE and the Loongson MultiMedia extensions
Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
limit on the maximum amount of recursion that is allowed whilst
demangling strings. This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
specifying the starting symbol for disassembly. Disassembly will
continue from this symbol up to the next symbol or the end of the
function.
* The BFD linker will now report property change in linker map file
when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
archives, unless -t is given twice. This makes it more useful
when generating a list of files that should be packaged for a
linker bug report.
* The GOLD linker has improved warning messages for relocations that
refer to discarded sections.
- Improve relro support on s390 [fate#326356]
- Fix broken debug symbols (bsc#1118644)
- Handle ELF compressed header alignment correctly.
Patchnames
SUSE-2019-2780,SUSE-SLE-Module-Basesystem-15-2019-2780,SUSE-SLE-Module-Development-Tools-15-2019-2780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2780,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2780
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don't check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump's --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker's -t option now doesn't report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-2780,SUSE-SLE-Module-Basesystem-15-2019-2780,SUSE-SLE-Module-Development-Tools-15-2019-2780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2780,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2780", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2780-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:2780-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:2780-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html", }, { category: "self", summary: "SUSE Bug 1109412", url: "https://bugzilla.suse.com/1109412", }, { category: "self", summary: "SUSE Bug 1109413", url: "https://bugzilla.suse.com/1109413", }, { category: "self", summary: "SUSE Bug 1109414", url: "https://bugzilla.suse.com/1109414", }, { category: "self", summary: "SUSE Bug 1111996", url: "https://bugzilla.suse.com/1111996", }, { category: "self", summary: "SUSE Bug 1112534", url: "https://bugzilla.suse.com/1112534", }, { category: "self", summary: "SUSE Bug 1112535", url: "https://bugzilla.suse.com/1112535", }, { category: "self", summary: "SUSE Bug 1113247", url: "https://bugzilla.suse.com/1113247", }, { category: "self", summary: "SUSE Bug 1113252", url: "https://bugzilla.suse.com/1113252", }, { category: "self", summary: "SUSE Bug 1113255", url: "https://bugzilla.suse.com/1113255", }, { category: "self", summary: "SUSE Bug 1116827", url: "https://bugzilla.suse.com/1116827", }, { category: "self", summary: "SUSE Bug 1118644", url: "https://bugzilla.suse.com/1118644", }, { category: "self", summary: "SUSE Bug 1118830", url: "https://bugzilla.suse.com/1118830", }, { category: "self", summary: "SUSE Bug 1118831", url: "https://bugzilla.suse.com/1118831", }, { category: "self", summary: "SUSE Bug 1120640", url: "https://bugzilla.suse.com/1120640", }, { category: "self", summary: "SUSE Bug 1121034", url: "https://bugzilla.suse.com/1121034", }, { category: "self", summary: "SUSE Bug 1121035", url: "https://bugzilla.suse.com/1121035", }, { category: "self", summary: "SUSE Bug 1121056", url: "https://bugzilla.suse.com/1121056", }, { category: "self", summary: "SUSE Bug 1133131", url: "https://bugzilla.suse.com/1133131", }, { category: "self", summary: "SUSE Bug 1133232", url: "https://bugzilla.suse.com/1133232", }, { category: "self", summary: "SUSE Bug 1141913", url: "https://bugzilla.suse.com/1141913", }, { category: "self", summary: "SUSE Bug 1142772", url: "https://bugzilla.suse.com/1142772", }, { category: "self", summary: "SUSE Bug 1152590", url: "https://bugzilla.suse.com/1152590", }, { category: "self", summary: "SUSE Bug 1154016", url: "https://bugzilla.suse.com/1154016", }, { category: "self", summary: "SUSE Bug 1154025", url: "https://bugzilla.suse.com/1154025", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, { category: "self", summary: "SUSE Bug ECO-368", url: "https://bugzilla.suse.com/ECO-368", }, { category: "self", summary: "SUSE Bug SLE-6206", url: "https://bugzilla.suse.com/SLE-6206", }, ], title: "Security update for binutils", tracking: { current_release_date: "2019-10-25T12:25:52Z", generator: { date: "2019-10-25T12:25:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:2780-1", initial_release_date: "2019-10-25T12:25:52Z", revision_history: [ { date: "2019-10-25T12:25:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.32-6.8.1.aarch64", product: { name: "binutils-2.32-6.8.1.aarch64", product_id: "binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.32-6.8.1.aarch64", product: { name: "binutils-devel-2.32-6.8.1.aarch64", product_id: "binutils-devel-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.32-6.8.1.aarch64", product: { name: "binutils-gold-2.32-6.8.1.aarch64", product_id: "binutils-gold-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-6.8.1.aarch64", product: { name: "cross-arm-binutils-2.32-6.8.1.aarch64", product_id: "cross-arm-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-6.8.1.aarch64", product: { name: "cross-avr-binutils-2.32-6.8.1.aarch64", product_id: "cross-avr-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-6.8.1.aarch64", product: { name: "cross-epiphany-binutils-2.32-6.8.1.aarch64", product_id: "cross-epiphany-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-6.8.1.aarch64", product: { name: "cross-hppa-binutils-2.32-6.8.1.aarch64", product_id: "cross-hppa-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-6.8.1.aarch64", product: { name: "cross-hppa64-binutils-2.32-6.8.1.aarch64", product_id: "cross-hppa64-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-6.8.1.aarch64", product: { name: "cross-i386-binutils-2.32-6.8.1.aarch64", product_id: "cross-i386-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-6.8.1.aarch64", product: { name: "cross-ia64-binutils-2.32-6.8.1.aarch64", product_id: "cross-ia64-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-6.8.1.aarch64", product: { name: "cross-m68k-binutils-2.32-6.8.1.aarch64", product_id: "cross-m68k-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-6.8.1.aarch64", product: { name: "cross-mips-binutils-2.32-6.8.1.aarch64", product_id: "cross-mips-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-6.8.1.aarch64", product: { name: "cross-ppc-binutils-2.32-6.8.1.aarch64", product_id: "cross-ppc-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-6.8.1.aarch64", product: { name: "cross-ppc64-binutils-2.32-6.8.1.aarch64", product_id: "cross-ppc64-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-6.8.1.aarch64", product: { name: "cross-ppc64le-binutils-2.32-6.8.1.aarch64", product_id: "cross-ppc64le-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-6.8.1.aarch64", product: { name: "cross-riscv64-binutils-2.32-6.8.1.aarch64", product_id: "cross-riscv64-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-6.8.1.aarch64", product: { name: "cross-rx-binutils-2.32-6.8.1.aarch64", product_id: "cross-rx-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-6.8.1.aarch64", product: { name: "cross-s390-binutils-2.32-6.8.1.aarch64", product_id: "cross-s390-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-6.8.1.aarch64", product: { name: "cross-s390x-binutils-2.32-6.8.1.aarch64", product_id: "cross-s390x-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-6.8.1.aarch64", product: { name: "cross-sparc-binutils-2.32-6.8.1.aarch64", product_id: "cross-sparc-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-6.8.1.aarch64", product: { name: "cross-sparc64-binutils-2.32-6.8.1.aarch64", product_id: "cross-sparc64-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-6.8.1.aarch64", product: { name: "cross-spu-binutils-2.32-6.8.1.aarch64", product_id: "cross-spu-binutils-2.32-6.8.1.aarch64", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-6.8.1.aarch64", product: { name: "cross-x86_64-binutils-2.32-6.8.1.aarch64", product_id: "cross-x86_64-binutils-2.32-6.8.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32", product: { name: "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32", product_id: "binutils-devel-64bit-2.32-6.8.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "binutils-2.32-6.8.1.i586", product: { name: "binutils-2.32-6.8.1.i586", product_id: "binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.32-6.8.1.i586", product: { name: "binutils-devel-2.32-6.8.1.i586", product_id: "binutils-devel-2.32-6.8.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.32-6.8.1.i586", product: { name: "binutils-gold-2.32-6.8.1.i586", product_id: "binutils-gold-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-6.8.1.i586", product: { name: "cross-aarch64-binutils-2.32-6.8.1.i586", product_id: "cross-aarch64-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-6.8.1.i586", product: { name: "cross-arm-binutils-2.32-6.8.1.i586", product_id: "cross-arm-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-6.8.1.i586", product: { name: "cross-avr-binutils-2.32-6.8.1.i586", product_id: "cross-avr-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-6.8.1.i586", product: { name: "cross-epiphany-binutils-2.32-6.8.1.i586", product_id: "cross-epiphany-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-6.8.1.i586", product: { name: "cross-hppa-binutils-2.32-6.8.1.i586", product_id: "cross-hppa-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-6.8.1.i586", product: { name: "cross-hppa64-binutils-2.32-6.8.1.i586", product_id: "cross-hppa64-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-6.8.1.i586", product: { name: "cross-ia64-binutils-2.32-6.8.1.i586", product_id: "cross-ia64-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-6.8.1.i586", product: { name: "cross-m68k-binutils-2.32-6.8.1.i586", product_id: "cross-m68k-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-6.8.1.i586", product: { name: "cross-mips-binutils-2.32-6.8.1.i586", product_id: "cross-mips-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-6.8.1.i586", product: { name: "cross-ppc-binutils-2.32-6.8.1.i586", product_id: "cross-ppc-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-6.8.1.i586", product: { name: "cross-ppc64-binutils-2.32-6.8.1.i586", product_id: "cross-ppc64-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-6.8.1.i586", product: { name: "cross-ppc64le-binutils-2.32-6.8.1.i586", product_id: "cross-ppc64le-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-6.8.1.i586", product: { name: "cross-riscv64-binutils-2.32-6.8.1.i586", product_id: "cross-riscv64-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-6.8.1.i586", product: { name: "cross-rx-binutils-2.32-6.8.1.i586", product_id: "cross-rx-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-6.8.1.i586", product: { name: "cross-s390-binutils-2.32-6.8.1.i586", product_id: "cross-s390-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-6.8.1.i586", product: { name: "cross-s390x-binutils-2.32-6.8.1.i586", product_id: "cross-s390x-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-6.8.1.i586", product: { name: "cross-sparc-binutils-2.32-6.8.1.i586", product_id: "cross-sparc-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-6.8.1.i586", product: { name: "cross-sparc64-binutils-2.32-6.8.1.i586", product_id: "cross-sparc64-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-6.8.1.i586", product: { name: "cross-spu-binutils-2.32-6.8.1.i586", product_id: "cross-spu-binutils-2.32-6.8.1.i586", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-6.8.1.i586", product: { name: "cross-x86_64-binutils-2.32-6.8.1.i586", product_id: "cross-x86_64-binutils-2.32-6.8.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.32-6.8.1.ppc64le", product: { name: "binutils-2.32-6.8.1.ppc64le", product_id: "binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.32-6.8.1.ppc64le", product: { name: "binutils-devel-2.32-6.8.1.ppc64le", product_id: "binutils-devel-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.32-6.8.1.ppc64le", product: { name: "binutils-gold-2.32-6.8.1.ppc64le", product_id: "binutils-gold-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-aarch64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-aarch64-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-arm-binutils-2.32-6.8.1.ppc64le", product_id: "cross-arm-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-avr-binutils-2.32-6.8.1.ppc64le", product_id: "cross-avr-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-epiphany-binutils-2.32-6.8.1.ppc64le", product_id: "cross-epiphany-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-hppa-binutils-2.32-6.8.1.ppc64le", product_id: "cross-hppa-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-hppa64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-hppa64-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-i386-binutils-2.32-6.8.1.ppc64le", product_id: "cross-i386-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-ia64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-ia64-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-m68k-binutils-2.32-6.8.1.ppc64le", product_id: "cross-m68k-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-mips-binutils-2.32-6.8.1.ppc64le", product_id: "cross-mips-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-ppc-binutils-2.32-6.8.1.ppc64le", product_id: "cross-ppc-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-ppc64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-ppc64-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-riscv64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-riscv64-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-rx-binutils-2.32-6.8.1.ppc64le", product_id: "cross-rx-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-s390-binutils-2.32-6.8.1.ppc64le", product_id: "cross-s390-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-s390x-binutils-2.32-6.8.1.ppc64le", product_id: "cross-s390x-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-sparc-binutils-2.32-6.8.1.ppc64le", product_id: "cross-sparc-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-sparc64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-sparc64-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-spu-binutils-2.32-6.8.1.ppc64le", product_id: "cross-spu-binutils-2.32-6.8.1.ppc64le", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-6.8.1.ppc64le", product: { name: "cross-x86_64-binutils-2.32-6.8.1.ppc64le", product_id: "cross-x86_64-binutils-2.32-6.8.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.32-6.8.1.s390x", product: { name: "binutils-2.32-6.8.1.s390x", product_id: "binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.32-6.8.1.s390x", product: { name: "binutils-devel-2.32-6.8.1.s390x", product_id: "binutils-devel-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "binutils-gold-2.32-6.8.1.s390x", product: { name: "binutils-gold-2.32-6.8.1.s390x", product_id: "binutils-gold-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-6.8.1.s390x", product: { name: "cross-aarch64-binutils-2.32-6.8.1.s390x", product_id: "cross-aarch64-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-6.8.1.s390x", product: { name: "cross-arm-binutils-2.32-6.8.1.s390x", product_id: "cross-arm-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-6.8.1.s390x", product: { name: "cross-avr-binutils-2.32-6.8.1.s390x", product_id: "cross-avr-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-6.8.1.s390x", product: { name: "cross-epiphany-binutils-2.32-6.8.1.s390x", product_id: "cross-epiphany-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-6.8.1.s390x", product: { name: "cross-hppa-binutils-2.32-6.8.1.s390x", product_id: "cross-hppa-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-6.8.1.s390x", product: { name: "cross-hppa64-binutils-2.32-6.8.1.s390x", product_id: "cross-hppa64-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-6.8.1.s390x", product: { name: "cross-i386-binutils-2.32-6.8.1.s390x", product_id: "cross-i386-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-6.8.1.s390x", product: { name: "cross-ia64-binutils-2.32-6.8.1.s390x", product_id: "cross-ia64-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-6.8.1.s390x", product: { name: "cross-m68k-binutils-2.32-6.8.1.s390x", product_id: "cross-m68k-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-6.8.1.s390x", product: { name: "cross-mips-binutils-2.32-6.8.1.s390x", product_id: "cross-mips-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-6.8.1.s390x", product: { name: "cross-ppc-binutils-2.32-6.8.1.s390x", product_id: "cross-ppc-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-6.8.1.s390x", product: { name: "cross-ppc64-binutils-2.32-6.8.1.s390x", product_id: "cross-ppc64-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-6.8.1.s390x", product: { name: "cross-ppc64le-binutils-2.32-6.8.1.s390x", product_id: "cross-ppc64le-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-6.8.1.s390x", product: { name: "cross-riscv64-binutils-2.32-6.8.1.s390x", product_id: "cross-riscv64-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-6.8.1.s390x", product: { name: "cross-rx-binutils-2.32-6.8.1.s390x", product_id: "cross-rx-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-6.8.1.s390x", product: { name: "cross-s390-binutils-2.32-6.8.1.s390x", product_id: "cross-s390-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-6.8.1.s390x", product: { name: "cross-sparc-binutils-2.32-6.8.1.s390x", product_id: "cross-sparc-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-6.8.1.s390x", product: { name: "cross-sparc64-binutils-2.32-6.8.1.s390x", product_id: "cross-sparc64-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-6.8.1.s390x", product: { name: "cross-spu-binutils-2.32-6.8.1.s390x", product_id: "cross-spu-binutils-2.32-6.8.1.s390x", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-6.8.1.s390x", product: { name: "cross-x86_64-binutils-2.32-6.8.1.s390x", product_id: "cross-x86_64-binutils-2.32-6.8.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.32-6.8.1.x86_64", product: { name: "binutils-2.32-6.8.1.x86_64", product_id: "binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.32-6.8.1.x86_64", product: { name: "binutils-devel-2.32-6.8.1.x86_64", product_id: "binutils-devel-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.32-6.8.1.x86_64", product: { name: "binutils-devel-32bit-2.32-6.8.1.x86_64", product_id: "binutils-devel-32bit-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.32-6.8.1.x86_64", product: { name: "binutils-gold-2.32-6.8.1.x86_64", product_id: "binutils-gold-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-6.8.1.x86_64", product: { name: "cross-aarch64-binutils-2.32-6.8.1.x86_64", product_id: "cross-aarch64-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-6.8.1.x86_64", product: { name: "cross-arm-binutils-2.32-6.8.1.x86_64", product_id: "cross-arm-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-6.8.1.x86_64", product: { name: "cross-avr-binutils-2.32-6.8.1.x86_64", product_id: "cross-avr-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-6.8.1.x86_64", product: { name: "cross-epiphany-binutils-2.32-6.8.1.x86_64", product_id: "cross-epiphany-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-6.8.1.x86_64", product: { name: "cross-hppa-binutils-2.32-6.8.1.x86_64", product_id: "cross-hppa-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-6.8.1.x86_64", product: { name: "cross-hppa64-binutils-2.32-6.8.1.x86_64", product_id: "cross-hppa64-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-6.8.1.x86_64", product: { name: "cross-i386-binutils-2.32-6.8.1.x86_64", product_id: "cross-i386-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-6.8.1.x86_64", product: { name: "cross-ia64-binutils-2.32-6.8.1.x86_64", product_id: "cross-ia64-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-6.8.1.x86_64", product: { name: "cross-m68k-binutils-2.32-6.8.1.x86_64", product_id: "cross-m68k-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-6.8.1.x86_64", product: { name: "cross-mips-binutils-2.32-6.8.1.x86_64", product_id: "cross-mips-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-6.8.1.x86_64", product: { name: "cross-ppc-binutils-2.32-6.8.1.x86_64", product_id: "cross-ppc-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-6.8.1.x86_64", product: { name: "cross-ppc64-binutils-2.32-6.8.1.x86_64", product_id: "cross-ppc64-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-6.8.1.x86_64", product: { name: "cross-ppc64le-binutils-2.32-6.8.1.x86_64", product_id: "cross-ppc64le-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-6.8.1.x86_64", product: { name: "cross-riscv64-binutils-2.32-6.8.1.x86_64", product_id: "cross-riscv64-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-6.8.1.x86_64", product: { name: "cross-rx-binutils-2.32-6.8.1.x86_64", product_id: "cross-rx-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-6.8.1.x86_64", product: { name: "cross-s390-binutils-2.32-6.8.1.x86_64", product_id: "cross-s390-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-6.8.1.x86_64", product: { name: "cross-s390x-binutils-2.32-6.8.1.x86_64", product_id: "cross-s390x-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-6.8.1.x86_64", product: { name: "cross-sparc-binutils-2.32-6.8.1.x86_64", product_id: "cross-sparc-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-6.8.1.x86_64", product: { name: "cross-sparc64-binutils-2.32-6.8.1.x86_64", product_id: "cross-sparc64-binutils-2.32-6.8.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-6.8.1.x86_64", product: { name: "cross-spu-binutils-2.32-6.8.1.x86_64", product_id: "cross-spu-binutils-2.32-6.8.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15", product: { name: "SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15", product: { name: "SUSE Linux Enterprise Module for Package Hub 15", product_id: "SUSE Linux Enterprise Module for Package Hub 15", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", }, product_reference: "binutils-2.32-6.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", }, product_reference: "binutils-2.32-6.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", }, product_reference: "binutils-2.32-6.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", }, product_reference: "binutils-2.32-6.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", }, product_reference: "binutils-devel-2.32-6.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", }, product_reference: "binutils-devel-2.32-6.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", }, product_reference: "binutils-devel-2.32-6.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", }, product_reference: "binutils-devel-2.32-6.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", }, product_reference: "binutils-devel-32bit-2.32-6.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-6.8.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15", product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", }, product_reference: "binutils-gold-2.32-6.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-6.8.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15", product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", }, product_reference: "binutils-gold-2.32-6.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-6.8.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15", product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", }, product_reference: "binutils-gold-2.32-6.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-6.8.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15", product_id: "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", }, product_reference: "binutils-gold-2.32-6.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "low", }, ], title: "CVE-2018-8945", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.32-6.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:binutils-gold-2.32-6.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-25T12:25:52Z", details: "important", }, ], title: "CVE-2019-1010180", }, ], }
suse-su-2019:2779-1
Vulnerability from csaf_suse
Published
2019-10-24 14:57
Modified
2019-10-24 14:57
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch [jsc#ECO-368].
Includes following security fixes:
- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)
- enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
(bsc#1141913).
- Fixed some LTO build issues (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section
- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).
- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).
Update to binutils 2.32:
* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
encoding of VEX.W-ignored (WIG) VEX instructions.
It also has a new -mx86-used-note=[yes|no] option to generate (or
not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
the Loongson EXTensions (EXT) instructions, the Loongson Content
Address Memory (CAM) ASE and the Loongson MultiMedia extensions
Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
limit on the maximum amount of recursion that is allowed whilst
demangling strings. This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
specifying the starting symbol for disassembly. Disassembly will
continue from this symbol up to the next symbol or the end of the
function.
* The BFD linker will now report property change in linker map file
when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
archives, unless -t is given twice. This makes it more useful
when generating a list of files that should be packaged for a
linker bug report.
* The GOLD linker has improved warning messages for relocations that
refer to discarded sections.
- Improve relro support on s390 [fate#326356]
- Fix broken debug symbols (bsc#1118644)
- Handle ELF compressed header alignment correctly.
Patchnames
SUSE-2019-2779,SUSE-SLE-Module-Basesystem-15-SP1-2019-2779,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2779,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2779,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2779
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\n\nbinutils was updated to current 2.32 branch [jsc#ECO-368].\n\nIncludes following security fixes:\n\n- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)\n- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)\n- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)\n- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)\n- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)\n- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)\n- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)\n- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)\n- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)\n- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)\n- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)\n- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)\n- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)\n- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)\n- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in load_specific_debug_section in objdump.c (bsc#1121056)\n- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)\n- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)\n\n- enable xtensa architecture (Tensilica lc6 and related)\n- Use -ffat-lto-objects in order to provide assembly for static libs\n (bsc#1141913).\n- Fixed some LTO build issues (bsc#1133131 bsc#1133232).\n- riscv: Don't check ABI flags if no code section\n- Fixed a segfault in ld when building some versions of pacemaker (bsc#1154025, bsc#1154016).\n- Add avr, epiphany and rx to target_list so that the common binutils can handle all objects we can create with crosses (bsc#1152590).\n\nUpdate to binutils 2.32:\n\n* The binutils now support for the C-SKY processor series.\n* The x86 assembler now supports a -mvexwig=[0|1] option to control\n encoding of VEX.W-ignored (WIG) VEX instructions.\n It also has a new -mx86-used-note=[yes|no] option to generate (or\n not) x86 GNU property notes. \n* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),\n the Loongson EXTensions (EXT) instructions, the Loongson Content\n Address Memory (CAM) ASE and the Loongson MultiMedia extensions\n Instructions (MMI) ASE.\n* The addr2line, c++filt, nm and objdump tools now have a default\n limit on the maximum amount of recursion that is allowed whilst\n demangling strings. This limit can be disabled if necessary.\n* Objdump's --disassemble option can now take a parameter,\n specifying the starting symbol for disassembly. Disassembly will\n continue from this symbol up to the next symbol or the end of the\n function.\n* The BFD linker will now report property change in linker map file\n when merging GNU properties.\n* The BFD linker's -t option now doesn't report members within\n archives, unless -t is given twice. This makes it more useful\n when generating a list of files that should be packaged for a\n linker bug report.\n* The GOLD linker has improved warning messages for relocations that\n refer to discarded sections.\n\n- Improve relro support on s390 [fate#326356]\n- Fix broken debug symbols (bsc#1118644)\n- Handle ELF compressed header alignment correctly.\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-2779,SUSE-SLE-Module-Basesystem-15-SP1-2019-2779,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2779,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2779,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2779", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2779-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:2779-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192779-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:2779-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html", }, { category: "self", summary: "SUSE Bug 1109412", url: "https://bugzilla.suse.com/1109412", }, { category: "self", summary: "SUSE Bug 1109413", url: "https://bugzilla.suse.com/1109413", }, { category: "self", summary: "SUSE Bug 1109414", url: "https://bugzilla.suse.com/1109414", }, { category: "self", summary: "SUSE Bug 1111996", url: "https://bugzilla.suse.com/1111996", }, { category: "self", summary: "SUSE Bug 1112534", url: "https://bugzilla.suse.com/1112534", }, { category: "self", summary: "SUSE Bug 1112535", url: "https://bugzilla.suse.com/1112535", }, { category: "self", summary: "SUSE Bug 1113247", url: "https://bugzilla.suse.com/1113247", }, { category: "self", summary: "SUSE Bug 1113252", url: "https://bugzilla.suse.com/1113252", }, { category: "self", summary: "SUSE Bug 1113255", url: "https://bugzilla.suse.com/1113255", }, { category: "self", summary: "SUSE Bug 1116827", url: "https://bugzilla.suse.com/1116827", }, { category: "self", summary: "SUSE Bug 1118644", url: "https://bugzilla.suse.com/1118644", }, { category: "self", summary: "SUSE Bug 1118830", url: "https://bugzilla.suse.com/1118830", }, { category: "self", summary: "SUSE Bug 1118831", url: "https://bugzilla.suse.com/1118831", }, { category: "self", summary: "SUSE Bug 1120640", url: "https://bugzilla.suse.com/1120640", }, { category: "self", summary: "SUSE Bug 1121034", url: "https://bugzilla.suse.com/1121034", }, { category: "self", summary: "SUSE Bug 1121035", url: "https://bugzilla.suse.com/1121035", }, { category: "self", summary: "SUSE Bug 1121056", url: "https://bugzilla.suse.com/1121056", }, { category: "self", summary: "SUSE Bug 1133131", url: "https://bugzilla.suse.com/1133131", }, { category: "self", summary: "SUSE Bug 1133232", url: "https://bugzilla.suse.com/1133232", }, { category: "self", summary: "SUSE Bug 1141913", url: "https://bugzilla.suse.com/1141913", }, { category: "self", summary: "SUSE Bug 1142772", url: "https://bugzilla.suse.com/1142772", }, { category: "self", summary: "SUSE Bug 1152590", url: "https://bugzilla.suse.com/1152590", }, { category: "self", summary: "SUSE Bug 1154016", url: "https://bugzilla.suse.com/1154016", }, { category: "self", summary: "SUSE Bug 1154025", url: "https://bugzilla.suse.com/1154025", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, { category: "self", summary: "SUSE Bug ECO-368", url: "https://bugzilla.suse.com/ECO-368", }, { category: "self", summary: "SUSE Bug SLE-6206", url: "https://bugzilla.suse.com/SLE-6206", }, ], title: "Security update for binutils", tracking: { current_release_date: "2019-10-24T14:57:52Z", generator: { date: "2019-10-24T14:57:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:2779-1", initial_release_date: "2019-10-24T14:57:52Z", revision_history: [ { date: "2019-10-24T14:57:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.32-7.5.1.aarch64", product: { name: "binutils-2.32-7.5.1.aarch64", product_id: "binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.32-7.5.1.aarch64", product: { name: "binutils-devel-2.32-7.5.1.aarch64", product_id: "binutils-devel-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.32-7.5.1.aarch64", product: { name: "binutils-gold-2.32-7.5.1.aarch64", product_id: "binutils-gold-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-7.5.1.aarch64", product: { name: "cross-arm-binutils-2.32-7.5.1.aarch64", product_id: "cross-arm-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-7.5.1.aarch64", product: { name: "cross-avr-binutils-2.32-7.5.1.aarch64", product_id: "cross-avr-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-7.5.1.aarch64", product: { name: "cross-epiphany-binutils-2.32-7.5.1.aarch64", product_id: "cross-epiphany-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-7.5.1.aarch64", product: { name: "cross-hppa-binutils-2.32-7.5.1.aarch64", product_id: "cross-hppa-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-7.5.1.aarch64", product: { name: "cross-hppa64-binutils-2.32-7.5.1.aarch64", product_id: "cross-hppa64-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-7.5.1.aarch64", product: { name: "cross-i386-binutils-2.32-7.5.1.aarch64", product_id: "cross-i386-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-7.5.1.aarch64", product: { name: "cross-ia64-binutils-2.32-7.5.1.aarch64", product_id: "cross-ia64-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-7.5.1.aarch64", product: { name: "cross-m68k-binutils-2.32-7.5.1.aarch64", product_id: "cross-m68k-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-7.5.1.aarch64", product: { name: "cross-mips-binutils-2.32-7.5.1.aarch64", product_id: "cross-mips-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-7.5.1.aarch64", product: { name: "cross-ppc-binutils-2.32-7.5.1.aarch64", product_id: "cross-ppc-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-7.5.1.aarch64", product: { name: "cross-ppc64-binutils-2.32-7.5.1.aarch64", product_id: "cross-ppc64-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-7.5.1.aarch64", product: { name: "cross-ppc64le-binutils-2.32-7.5.1.aarch64", product_id: "cross-ppc64le-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-7.5.1.aarch64", product: { name: "cross-riscv64-binutils-2.32-7.5.1.aarch64", product_id: "cross-riscv64-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-7.5.1.aarch64", product: { name: "cross-rx-binutils-2.32-7.5.1.aarch64", product_id: "cross-rx-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-7.5.1.aarch64", product: { name: "cross-s390-binutils-2.32-7.5.1.aarch64", product_id: "cross-s390-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-7.5.1.aarch64", product: { name: "cross-s390x-binutils-2.32-7.5.1.aarch64", product_id: "cross-s390x-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-7.5.1.aarch64", product: { name: "cross-sparc-binutils-2.32-7.5.1.aarch64", product_id: "cross-sparc-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-7.5.1.aarch64", product: { name: "cross-sparc64-binutils-2.32-7.5.1.aarch64", product_id: "cross-sparc64-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-7.5.1.aarch64", product: { name: "cross-spu-binutils-2.32-7.5.1.aarch64", product_id: "cross-spu-binutils-2.32-7.5.1.aarch64", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-7.5.1.aarch64", product: { name: "cross-x86_64-binutils-2.32-7.5.1.aarch64", product_id: "cross-x86_64-binutils-2.32-7.5.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-devel-64bit-2.32-7.5.1.aarch64_ilp32", product: { name: "binutils-devel-64bit-2.32-7.5.1.aarch64_ilp32", product_id: "binutils-devel-64bit-2.32-7.5.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "binutils-2.32-7.5.1.i586", product: { name: "binutils-2.32-7.5.1.i586", product_id: "binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.32-7.5.1.i586", product: { name: "binutils-devel-2.32-7.5.1.i586", product_id: "binutils-devel-2.32-7.5.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.32-7.5.1.i586", product: { name: "binutils-gold-2.32-7.5.1.i586", product_id: "binutils-gold-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-7.5.1.i586", product: { name: "cross-aarch64-binutils-2.32-7.5.1.i586", product_id: "cross-aarch64-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-7.5.1.i586", product: { name: "cross-arm-binutils-2.32-7.5.1.i586", product_id: "cross-arm-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-7.5.1.i586", product: { name: "cross-avr-binutils-2.32-7.5.1.i586", product_id: "cross-avr-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-7.5.1.i586", product: { name: "cross-epiphany-binutils-2.32-7.5.1.i586", product_id: "cross-epiphany-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-7.5.1.i586", product: { name: "cross-hppa-binutils-2.32-7.5.1.i586", product_id: "cross-hppa-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-7.5.1.i586", product: { name: "cross-hppa64-binutils-2.32-7.5.1.i586", product_id: "cross-hppa64-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-7.5.1.i586", product: { name: "cross-ia64-binutils-2.32-7.5.1.i586", product_id: "cross-ia64-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-7.5.1.i586", product: { name: "cross-m68k-binutils-2.32-7.5.1.i586", product_id: "cross-m68k-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-7.5.1.i586", product: { name: "cross-mips-binutils-2.32-7.5.1.i586", product_id: "cross-mips-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-7.5.1.i586", product: { name: "cross-ppc-binutils-2.32-7.5.1.i586", product_id: "cross-ppc-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-7.5.1.i586", product: { name: "cross-ppc64-binutils-2.32-7.5.1.i586", product_id: "cross-ppc64-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-7.5.1.i586", product: { name: "cross-ppc64le-binutils-2.32-7.5.1.i586", product_id: "cross-ppc64le-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-7.5.1.i586", product: { name: "cross-riscv64-binutils-2.32-7.5.1.i586", product_id: "cross-riscv64-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-7.5.1.i586", product: { name: "cross-rx-binutils-2.32-7.5.1.i586", product_id: "cross-rx-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-7.5.1.i586", product: { name: "cross-s390-binutils-2.32-7.5.1.i586", product_id: "cross-s390-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-7.5.1.i586", product: { name: "cross-s390x-binutils-2.32-7.5.1.i586", product_id: "cross-s390x-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-7.5.1.i586", product: { name: "cross-sparc-binutils-2.32-7.5.1.i586", product_id: "cross-sparc-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-7.5.1.i586", product: { name: "cross-sparc64-binutils-2.32-7.5.1.i586", product_id: "cross-sparc64-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-7.5.1.i586", product: { name: "cross-spu-binutils-2.32-7.5.1.i586", product_id: "cross-spu-binutils-2.32-7.5.1.i586", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-7.5.1.i586", product: { name: "cross-x86_64-binutils-2.32-7.5.1.i586", product_id: "cross-x86_64-binutils-2.32-7.5.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.32-7.5.1.ppc64le", product: { name: "binutils-2.32-7.5.1.ppc64le", product_id: "binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.32-7.5.1.ppc64le", product: { name: "binutils-devel-2.32-7.5.1.ppc64le", product_id: "binutils-devel-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.32-7.5.1.ppc64le", product: { name: "binutils-gold-2.32-7.5.1.ppc64le", product_id: "binutils-gold-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-aarch64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-aarch64-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-arm-binutils-2.32-7.5.1.ppc64le", product_id: "cross-arm-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-avr-binutils-2.32-7.5.1.ppc64le", product_id: "cross-avr-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-epiphany-binutils-2.32-7.5.1.ppc64le", product_id: "cross-epiphany-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-hppa-binutils-2.32-7.5.1.ppc64le", product_id: "cross-hppa-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-hppa64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-hppa64-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-i386-binutils-2.32-7.5.1.ppc64le", product_id: "cross-i386-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-ia64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-ia64-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-m68k-binutils-2.32-7.5.1.ppc64le", product_id: "cross-m68k-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-mips-binutils-2.32-7.5.1.ppc64le", product_id: "cross-mips-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-ppc-binutils-2.32-7.5.1.ppc64le", product_id: "cross-ppc-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-ppc64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-ppc64-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-riscv64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-riscv64-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-rx-binutils-2.32-7.5.1.ppc64le", product_id: "cross-rx-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-s390-binutils-2.32-7.5.1.ppc64le", product_id: "cross-s390-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-s390x-binutils-2.32-7.5.1.ppc64le", product_id: "cross-s390x-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-sparc-binutils-2.32-7.5.1.ppc64le", product_id: "cross-sparc-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-sparc64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-sparc64-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-spu-binutils-2.32-7.5.1.ppc64le", product_id: "cross-spu-binutils-2.32-7.5.1.ppc64le", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-7.5.1.ppc64le", product: { name: "cross-x86_64-binutils-2.32-7.5.1.ppc64le", product_id: "cross-x86_64-binutils-2.32-7.5.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.32-7.5.1.s390x", product: { name: "binutils-2.32-7.5.1.s390x", product_id: "binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.32-7.5.1.s390x", product: { name: "binutils-devel-2.32-7.5.1.s390x", product_id: "binutils-devel-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "binutils-gold-2.32-7.5.1.s390x", product: { name: "binutils-gold-2.32-7.5.1.s390x", product_id: "binutils-gold-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-7.5.1.s390x", product: { name: "cross-aarch64-binutils-2.32-7.5.1.s390x", product_id: "cross-aarch64-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-7.5.1.s390x", product: { name: "cross-arm-binutils-2.32-7.5.1.s390x", product_id: "cross-arm-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-7.5.1.s390x", product: { name: "cross-avr-binutils-2.32-7.5.1.s390x", product_id: "cross-avr-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-7.5.1.s390x", product: { name: "cross-epiphany-binutils-2.32-7.5.1.s390x", product_id: "cross-epiphany-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-7.5.1.s390x", product: { name: "cross-hppa-binutils-2.32-7.5.1.s390x", product_id: "cross-hppa-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-7.5.1.s390x", product: { name: "cross-hppa64-binutils-2.32-7.5.1.s390x", product_id: "cross-hppa64-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-7.5.1.s390x", product: { name: "cross-i386-binutils-2.32-7.5.1.s390x", product_id: "cross-i386-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-7.5.1.s390x", product: { name: "cross-ia64-binutils-2.32-7.5.1.s390x", product_id: "cross-ia64-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-7.5.1.s390x", product: { name: "cross-m68k-binutils-2.32-7.5.1.s390x", product_id: "cross-m68k-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-7.5.1.s390x", product: { name: "cross-mips-binutils-2.32-7.5.1.s390x", product_id: "cross-mips-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-7.5.1.s390x", product: { name: "cross-ppc-binutils-2.32-7.5.1.s390x", product_id: "cross-ppc-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-7.5.1.s390x", product: { name: "cross-ppc64-binutils-2.32-7.5.1.s390x", product_id: "cross-ppc64-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-7.5.1.s390x", product: { name: "cross-ppc64le-binutils-2.32-7.5.1.s390x", product_id: "cross-ppc64le-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-7.5.1.s390x", product: { name: "cross-riscv64-binutils-2.32-7.5.1.s390x", product_id: "cross-riscv64-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-7.5.1.s390x", product: { name: "cross-rx-binutils-2.32-7.5.1.s390x", product_id: "cross-rx-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-7.5.1.s390x", product: { name: "cross-s390-binutils-2.32-7.5.1.s390x", product_id: "cross-s390-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-7.5.1.s390x", product: { name: "cross-sparc-binutils-2.32-7.5.1.s390x", product_id: "cross-sparc-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-7.5.1.s390x", product: { name: "cross-sparc64-binutils-2.32-7.5.1.s390x", product_id: "cross-sparc64-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-7.5.1.s390x", product: { name: "cross-spu-binutils-2.32-7.5.1.s390x", product_id: "cross-spu-binutils-2.32-7.5.1.s390x", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.32-7.5.1.s390x", product: { name: "cross-x86_64-binutils-2.32-7.5.1.s390x", product_id: "cross-x86_64-binutils-2.32-7.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.32-7.5.1.x86_64", product: { name: "binutils-2.32-7.5.1.x86_64", product_id: "binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.32-7.5.1.x86_64", product: { name: "binutils-devel-2.32-7.5.1.x86_64", product_id: "binutils-devel-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.32-7.5.1.x86_64", product: { name: "binutils-devel-32bit-2.32-7.5.1.x86_64", product_id: "binutils-devel-32bit-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.32-7.5.1.x86_64", product: { name: "binutils-gold-2.32-7.5.1.x86_64", product_id: "binutils-gold-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.32-7.5.1.x86_64", product: { name: "cross-aarch64-binutils-2.32-7.5.1.x86_64", product_id: "cross-aarch64-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-arm-binutils-2.32-7.5.1.x86_64", product: { name: "cross-arm-binutils-2.32-7.5.1.x86_64", product_id: "cross-arm-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-avr-binutils-2.32-7.5.1.x86_64", product: { name: "cross-avr-binutils-2.32-7.5.1.x86_64", product_id: "cross-avr-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.32-7.5.1.x86_64", product: { name: "cross-epiphany-binutils-2.32-7.5.1.x86_64", product_id: "cross-epiphany-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.32-7.5.1.x86_64", product: { name: "cross-hppa-binutils-2.32-7.5.1.x86_64", product_id: "cross-hppa-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.32-7.5.1.x86_64", product: { name: "cross-hppa64-binutils-2.32-7.5.1.x86_64", product_id: "cross-hppa64-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-i386-binutils-2.32-7.5.1.x86_64", product: { name: "cross-i386-binutils-2.32-7.5.1.x86_64", product_id: "cross-i386-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.32-7.5.1.x86_64", product: { name: "cross-ia64-binutils-2.32-7.5.1.x86_64", product_id: "cross-ia64-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.32-7.5.1.x86_64", product: { name: "cross-m68k-binutils-2.32-7.5.1.x86_64", product_id: "cross-m68k-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-mips-binutils-2.32-7.5.1.x86_64", product: { name: "cross-mips-binutils-2.32-7.5.1.x86_64", product_id: "cross-mips-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.32-7.5.1.x86_64", product: { name: "cross-ppc-binutils-2.32-7.5.1.x86_64", product_id: "cross-ppc-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.32-7.5.1.x86_64", product: { name: "cross-ppc64-binutils-2.32-7.5.1.x86_64", product_id: "cross-ppc64-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.32-7.5.1.x86_64", product: { name: "cross-ppc64le-binutils-2.32-7.5.1.x86_64", product_id: "cross-ppc64le-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.32-7.5.1.x86_64", product: { name: "cross-riscv64-binutils-2.32-7.5.1.x86_64", product_id: "cross-riscv64-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-rx-binutils-2.32-7.5.1.x86_64", product: { name: "cross-rx-binutils-2.32-7.5.1.x86_64", product_id: "cross-rx-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-s390-binutils-2.32-7.5.1.x86_64", product: { name: "cross-s390-binutils-2.32-7.5.1.x86_64", product_id: "cross-s390-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.32-7.5.1.x86_64", product: { name: "cross-s390x-binutils-2.32-7.5.1.x86_64", product_id: "cross-s390x-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.32-7.5.1.x86_64", product: { name: "cross-sparc-binutils-2.32-7.5.1.x86_64", product_id: "cross-sparc-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.32-7.5.1.x86_64", product: { name: "cross-sparc64-binutils-2.32-7.5.1.x86_64", product_id: "cross-sparc64-binutils-2.32-7.5.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.32-7.5.1.x86_64", product: { name: "cross-spu-binutils-2.32-7.5.1.x86_64", product_id: "cross-spu-binutils-2.32-7.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP1", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.32-7.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", }, product_reference: "binutils-2.32-7.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-7.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", }, product_reference: "binutils-2.32-7.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-7.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", }, product_reference: "binutils-2.32-7.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", }, product_reference: "binutils-2.32-7.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-7.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", }, product_reference: "binutils-devel-2.32-7.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-7.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", }, product_reference: "binutils-devel-2.32-7.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-7.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", }, product_reference: "binutils-devel-2.32-7.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", }, product_reference: "binutils-devel-2.32-7.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", }, product_reference: "binutils-devel-32bit-2.32-7.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-7.5.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", }, product_reference: "binutils-gold-2.32-7.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-7.5.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", }, product_reference: "binutils-gold-2.32-7.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-7.5.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", }, product_reference: "binutils-gold-2.32-7.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.32-7.5.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", }, product_reference: "binutils-gold-2.32-7.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "low", }, ], title: "CVE-2018-8945", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.32-7.5.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.32-7.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-24T14:57:52Z", details: "important", }, ], title: "CVE-2019-1010180", }, ], }
ghsa-7w52-j2x8-qcp8
Vulnerability from github
Published
2022-05-13 01:19
Modified
2022-05-13 01:19
Severity ?
Details
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
{ affected: [], aliases: [ "CVE-2018-19931", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-12-07T07:29:00Z", severity: "HIGH", }, details: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", id: "GHSA-7w52-j2x8-qcp8", modified: "2022-05-13T01:19:50Z", published: "2022-05-13T01:19:50Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-19931", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201908-01", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20190221-0004", }, { type: "WEB", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { type: "WEB", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", }, { type: "WEB", url: "https://usn.ubuntu.com/4336-1", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { type: "WEB", url: "http://www.securityfocus.com/bid/106144", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2018-19931
Vulnerability from fkie_nvd
Published
2018-12-07 07:29
Modified
2024-11-21 03:58
Severity ?
Summary
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | binutils | * | |
netapp | vasa_provider | * | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", matchCriteriaId: "421B3097-1A0F-4D5E-B0BD-8FC9752D8490", versionEndIncluding: "2.31", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:clustered_data_ontap:*:*", matchCriteriaId: "C57F75D8-DF7A-49D1-BB27-FF21661107B3", versionStartIncluding: "7.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", }, { lang: "es", value: "Se ha descubierto un problema en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils 2.31. Hay un desbordamiento de búfer basado en memoria dinámica (heap) en bfd_elf32_swap_phdr_in en elfcode.h debido a que el número de cabeceras del programa no está restringido.", }, ], id: "CVE-2018-19931", lastModified: "2024-11-21T03:58:49.940", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T07:29:00.253", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106144", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201908-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { source: "cve@mitre.org", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4336-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106144", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201908-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5f60af5d24d181371d67534fa273dd221df20c07", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4336-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2018-19931
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-19931", description: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", id: "GSD-2018-19931", references: [ "https://www.suse.com/security/cve/CVE-2018-19931.html", "https://ubuntu.com/security/CVE-2018-19931", "https://security.archlinux.org/CVE-2018-19931", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-19931", ], details: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", id: "GSD-2018-19931", modified: "2023-12-13T01:22:38.861185Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-19931", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", refsource: "MISC", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", refsource: "MISC", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", }, { name: "https://security.netapp.com/advisory/ntap-20190221-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { name: "106144", refsource: "BID", url: "http://www.securityfocus.com/bid/106144", }, { name: "GLSA-201908-01", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201908-01", }, { name: "openSUSE-SU-2019:2415", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { name: "openSUSE-SU-2019:2432", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { name: "USN-4336-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4336-1/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.31", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:clustered_data_ontap:*:*", cpe_name: [], versionStartIncluding: "7.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-19931", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", refsource: "MISC", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=23942", }, { name: "106144", refsource: "BID", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106144", }, { name: "https://security.netapp.com/advisory/ntap-20190221-0004/", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190221-0004/", }, { name: "GLSA-201908-01", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201908-01", }, { name: "openSUSE-SU-2019:2415", refsource: "SUSE", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", }, { name: "openSUSE-SU-2019:2432", refsource: "SUSE", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", }, { name: "USN-4336-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4336-1/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2023-03-01T17:14Z", publishedDate: "2018-12-07T07:29Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.