Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12699 (GCVE-0-2018-12699)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:45:01.233Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"name": "104540",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104540"
},
{
"name": "GLSA-201908-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"name": "USN-4336-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-29T02:06:20",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"name": "104540",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104540"
},
{
"name": "GLSA-201908-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"name": "USN-4336-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-12699",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
"refsource": "MISC",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"name": "104540",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104540"
},
{
"name": "GLSA-201908-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4336-1/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-12699",
"datePublished": "2018-06-23T22:00:00",
"dateReserved": "2018-06-23T00:00:00",
"dateUpdated": "2024-08-05T08:45:01.233Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-12699\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-06-23T23:29:00.330\",\"lastModified\":\"2024-11-21T03:45:42.110\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.\"},{\"lang\":\"es\",\"value\":\"finish_stab en stabs.c en GNU Binutils 2.30 permite que los atacantes provoquen una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer basado en memoria din\u00e1mica o heap) u otro tipo de impacto sin especificar. Esto queda demostrado con una escritura fuera de l\u00edmites de 8 bytes. Esto puede ocurrir durante la ejecuci\u00f3n de objdump.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A3A002B-702A-4599-96AF-1295A7B4F5BA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28D7E4B-FB96-4B9E-915C-3DC43DE602E9\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/104540\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-01\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=23057\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/104540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=23057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
cnvd-2018-12047
Vulnerability from cnvd
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://www.gnu.org/software/binutils/
| Name | GNU Binutils 2.30 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-12699"
}
},
"description": "GNU Binutils\uff08\u53c8\u540dGNU Binary Utilities\u6216binutils\uff09\u662fGNU\u8ba1\u5212\u5f00\u53d1\u7684\u4e00\u7ec4\u7f16\u7a0b\u8bed\u8a00\u5de5\u5177\u7a0b\u5e8f\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u5904\u7406\u591a\u79cd\u683c\u5f0f\u7684\u76ee\u6807\u6587\u4ef6\uff0c\u5e76\u63d0\u4f9b\u6709\u8fde\u63a5\u5668\u3001\u6c47\u7f16\u5668\u548c\u5176\u4ed6\u7528\u4e8e\u76ee\u6807\u6587\u4ef6\u548c\u6863\u6848\u7684\u5de5\u5177\u3002\r\n\r\nGNU Binutils 2.30\u7248\u672c\u4e2d\u7684stabs.c\u6587\u4ef6\u7684\u2018finish_stab\u2019\u51fd\u6570\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u57fa\u4e8e\u5806\u7684\u7f13\u51b2\u533a\u6ea2\u51fa\uff09\u3002",
"discovererName": "Sergej Schumilo",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://www.gnu.org/software/binutils/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-12047",
"openTime": "2018-06-26",
"products": {
"product": "GNU Binutils 2.30"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
"serverity": "\u4e2d",
"submitTime": "2018-06-25",
"title": "GNU Binutils\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2018-12047\uff09"
}
fkie_cve-2018-12699
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/104540 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 | Exploit, Issue Tracking, Vendor Advisory | |
| cve@mitre.org | https://security.gentoo.org/glsa/201908-01 | ||
| cve@mitre.org | https://sourceware.org/bugzilla/show_bug.cgi?id=23057 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://usn.ubuntu.com/4336-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104540 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 | Exploit, Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201908-01 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://sourceware.org/bugzilla/show_bug.cgi?id=23057 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4336-1/ |
| Vendor | Product | Version | |
|---|---|---|---|
| gnu | binutils | 2.30 | |
| canonical | ubuntu_linux | 16.04.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "1A3A002B-702A-4599-96AF-1295A7B4F5BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C28D7E4B-FB96-4B9E-915C-3DC43DE602E9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump."
},
{
"lang": "es",
"value": "finish_stab en stabs.c en GNU Binutils 2.30 permite que los atacantes provoquen una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer basado en memoria din\u00e1mica o heap) u otro tipo de impacto sin especificar. Esto queda demostrado con una escritura fuera de l\u00edmites de 8 bytes. Esto puede ocurrir durante la ejecuci\u00f3n de objdump."
}
],
"id": "CVE-2018-12699",
"lastModified": "2024-11-21T03:45:42.110",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-23T23:29:00.330",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104540"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104540"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2025-AVI-0337
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect:Direct Web Services versions 6.1.x antérieures à 6.1.0.28 | ||
| IBM | QRadar | QRadar Suite Software versions 1.1x.x.x antérieures à 1.11.2.x | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.1x.x.x antérieures à 1.11.2.x | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.6.0 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Direct Web Services versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.28",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.1x.x.x ant\u00e9rieures \u00e0 1.11.2.x",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.1x.x.x ant\u00e9rieures \u00e0 1.11.2.x",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.6.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2020-35494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35494"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2020-35496",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35496"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-1302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1302"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2018-18700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18700"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-35495",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35495"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"name": "CVE-2019-12972",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12972"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2020-35507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35507"
},
{
"name": "CVE-2020-35493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35493"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2025-04-18T00:00:00",
"last_revision_date": "2025-04-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0337",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Injection SQL (SQLi)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-04-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7230739",
"url": "https://www.ibm.com/support/pages/node/7230739"
},
{
"published_at": "2025-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7231169",
"url": "https://www.ibm.com/support/pages/node/7231169"
},
{
"published_at": "2025-04-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7231051",
"url": "https://www.ibm.com/support/pages/node/7231051"
}
]
}
CERTFR-2025-AVI-0154
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP11 IF01 | ||
| IBM | Controller | Controller versions 11.1.0.x antérieures à 11.1.0.1 | ||
| IBM | MaaS360 | MaaS360 Base, Configuration Utility versions antérieures à 3.001.100 | ||
| IBM | MaaS360 | MaaS360 Mobile Enterprise Gateway versions antérieures à 3.001.100 | ||
| IBM | Cognos Controller | Cognos Controller versions 11.x antérieures à 11.0.1 FP4 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP11 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Controller versions 11.1.0.x ant\u00e9rieures \u00e0 11.1.0.1",
"product": {
"name": "Controller",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 Base, Configuration Utility versions ant\u00e9rieures \u00e0 3.001.100",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.001.100",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Controller versions 11.x ant\u00e9rieures \u00e0 11.0.1 FP4",
"product": {
"name": "Cognos Controller",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-45084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45084"
},
{
"name": "CVE-2024-45081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45081"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2021-36373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36373"
},
{
"name": "CVE-2015-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2325"
},
{
"name": "CVE-2024-28780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28780"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2021-36374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36374"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52902"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2023-47160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47160"
},
{
"name": "CVE-2024-28776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28776"
},
{
"name": "CVE-2024-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21907"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2024-40642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40642"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-4245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4245"
},
{
"name": "CVE-2022-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4244"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2020-11979",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11979"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-28777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28777"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2025-02-21T00:00:00",
"last_revision_date": "2025-02-21T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0154",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183597",
"url": "https://www.ibm.com/support/pages/node/7183597"
},
{
"published_at": "2025-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183584",
"url": "https://www.ibm.com/support/pages/node/7183584"
},
{
"published_at": "2025-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183612",
"url": "https://www.ibm.com/support/pages/node/7183612"
}
]
}
CERTFR-2025-AVI-0401
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Juniper Networks Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 7.5.0 antérieures à 7.5.0 UP11 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-11218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11218"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2025-1244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1244"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2024-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-56463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56463"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-05-14T00:00:00",
"last_revision_date": "2025-05-30T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0401",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
},
{
"description": "Ajouts des identifiants CVE CVE-2017-9047, CVE-2021-37533, CVE-2023-52922, CVE-2024-11218, CVE-2024-50302, CVE-2024-53197, CVE-2024-56171, CVE-2024-57807, CVE-2024-57979, CVE-2025-0624, CVE-2025-21785, CVE-2025-24813, CVE-2025-24928, CVE-2025-27363 et CVE-2025-27516.",
"revision_date": "2025-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Secure Analytics",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA98556",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP11-IF03"
}
]
}
gsd-2018-12699
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2018-12699",
"description": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.",
"id": "GSD-2018-12699",
"references": [
"https://www.suse.com/security/cve/CVE-2018-12699.html",
"https://ubuntu.com/security/CVE-2018-12699"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-12699"
],
"details": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.",
"id": "GSD-2018-12699",
"modified": "2023-12-13T01:22:29.767988Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-12699",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
"refsource": "MISC",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"name": "104540",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104540"
},
{
"name": "GLSA-201908-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4336-1/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-12699"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"name": "104540",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104540"
},
{
"name": "GLSA-201908-01",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/4336-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-08-03T13:15Z",
"publishedDate": "2018-06-23T23:29Z"
}
}
}
rhsa-2024_9689
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for binutils is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.\n\nSecurity Fix(es):\n\n* binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9689",
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1595427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9689.json"
}
],
"title": "Red Hat Security Advisory: binutils security update",
"tracking": {
"current_release_date": "2024-11-25T07:54:39+00:00",
"generator": {
"date": "2024-11-25T07:54:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:9689",
"initial_release_date": "2024-11-14T18:13:41+00:00",
"revision_history": [
{
"date": "2024-11-14T18:13:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T18:13:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T07:54:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.i686",
"product_id": "binutils-devel-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x",
"product_id": "binutils-devel-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-0:2.30-125.el8_10.s390x",
"product_id": "binutils-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.src",
"product": {
"name": "binutils-0:2.30-125.el8_10.src",
"product_id": "binutils-0:2.30-125.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src"
},
"product_reference": "binutils-0:2.30-125.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src"
},
"product_reference": "binutils-0:2.30-125.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12699",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595427"
}
],
"notes": [
{
"category": "description",
"text": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: heap-based buffer overflow in finish_stab in stabs.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a vulnerability affecting binutils, a suite of tools for managing binaries on a linux system; as these tools are used by developers in compilation and debugging, the expected use case is a local user examining object files on a local filesystem, or using ssh to log in. Because of differences in how upstream sources and other vendors provide these utilities, other sources might report the impact of this flaw differently. However, while it is possible for specifically-crafted input to crash binutils via this flaw, Red Hat does not assess that it represents a significant security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12699"
},
{
"category": "external",
"summary": "RHBZ#1595427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T18:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: heap-based buffer overflow in finish_stab in stabs.c"
}
]
}
RHSA-2024:9689
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for binutils is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.\n\nSecurity Fix(es):\n\n* binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9689",
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1595427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9689.json"
}
],
"title": "Red Hat Security Advisory: binutils security update",
"tracking": {
"current_release_date": "2025-10-09T18:16:02+00:00",
"generator": {
"date": "2025-10-09T18:16:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:9689",
"initial_release_date": "2024-11-14T18:13:41+00:00",
"revision_history": [
{
"date": "2024-11-14T18:13:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T18:13:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.i686",
"product_id": "binutils-devel-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x",
"product_id": "binutils-devel-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-0:2.30-125.el8_10.s390x",
"product_id": "binutils-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.src",
"product": {
"name": "binutils-0:2.30-125.el8_10.src",
"product_id": "binutils-0:2.30-125.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src"
},
"product_reference": "binutils-0:2.30-125.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src"
},
"product_reference": "binutils-0:2.30-125.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12699",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595427"
}
],
"notes": [
{
"category": "description",
"text": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: heap-based buffer overflow in finish_stab in stabs.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a vulnerability affecting binutils, a suite of tools for managing binaries on a linux system; as these tools are used by developers in compilation and debugging, the expected use case is a local user examining object files on a local filesystem, or using ssh to log in. Because of differences in how upstream sources and other vendors provide these utilities, other sources might report the impact of this flaw differently. However, while it is possible for specifically-crafted input to crash binutils via this flaw, Red Hat does not assess that it represents a significant security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12699"
},
{
"category": "external",
"summary": "RHBZ#1595427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T18:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: heap-based buffer overflow in finish_stab in stabs.c"
}
]
}
rhsa-2024:9689
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for binutils is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.\n\nSecurity Fix(es):\n\n* binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9689",
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1595427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9689.json"
}
],
"title": "Red Hat Security Advisory: binutils security update",
"tracking": {
"current_release_date": "2025-10-09T18:16:02+00:00",
"generator": {
"date": "2025-10-09T18:16:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:9689",
"initial_release_date": "2024-11-14T18:13:41+00:00",
"revision_history": [
{
"date": "2024-11-14T18:13:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T18:13:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-devel-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.aarch64",
"product": {
"name": "binutils-0:2.30-125.el8_10.aarch64",
"product_id": "binutils-0:2.30-125.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.ppc64le",
"product": {
"name": "binutils-0:2.30-125.el8_10.ppc64le",
"product_id": "binutils-0:2.30-125.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.i686",
"product_id": "binutils-devel-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-devel-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.x86_64",
"product": {
"name": "binutils-0:2.30-125.el8_10.x86_64",
"product_id": "binutils-0:2.30-125.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x",
"product_id": "binutils-devel-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-devel@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product_id": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debugsource@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product_id": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils-debuginfo@2.30-125.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.s390x",
"product": {
"name": "binutils-0:2.30-125.el8_10.s390x",
"product_id": "binutils-0:2.30-125.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-0:2.30-125.el8_10.src",
"product": {
"name": "binutils-0:2.30-125.el8_10.src",
"product_id": "binutils-0:2.30-125.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/binutils@2.30-125.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src"
},
"product_reference": "binutils-0:2.30-125.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src"
},
"product_reference": "binutils-0:2.30-125.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debuginfo-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-debugsource-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-debugsource-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-0:2.30-125.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
},
"product_reference": "binutils-devel-0:2.30-125.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12699",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1595427"
}
],
"notes": [
{
"category": "description",
"text": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "binutils: heap-based buffer overflow in finish_stab in stabs.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a vulnerability affecting binutils, a suite of tools for managing binaries on a linux system; as these tools are used by developers in compilation and debugging, the expected use case is a local user examining object files on a local filesystem, or using ssh to log in. Because of differences in how upstream sources and other vendors provide these utilities, other sources might report the impact of this flaw differently. However, while it is possible for specifically-crafted input to crash binutils via this flaw, Red Hat does not assess that it represents a significant security impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12699"
},
{
"category": "external",
"summary": "RHBZ#1595427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699"
}
],
"release_date": "2018-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T18:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debuginfo-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-debugsource-0:2.30-125.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:binutils-devel-0:2.30-125.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "binutils: heap-based buffer overflow in finish_stab in stabs.c"
}
]
}
wid-sec-w-2024-3470
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen f\u00fcr die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3470 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3470.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3470 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3470"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-11-14",
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9689 vom 2024-11-18",
"url": "http://linux.oracle.com/errata/ELSA-2024-9689.html"
}
],
"source_lang": "en-US",
"title": "binutils: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-11-17T23:00:00.000+00:00",
"generator": {
"date": "2024-11-18T09:04:43.374+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3470",
"initial_release_date": "2024-11-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source binutils",
"product": {
"name": "Open Source binutils",
"product_id": "T017623",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:binutils:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T034267",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12699",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in binutils aufgrund eines Heap-basierten Puffer\u00fcberlaufs in der Funktion stabs.c. Dies erm\u00f6glicht Out-of-Bounds Schreibzugriffe. Ein lokaler Angreifer kann diese Schwachstelle w\u00e4hrend der Ausf\u00fchrung von objdump ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen unspezifischen Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T017623",
"T004914",
"T034267"
]
},
"release_date": "2024-11-14T23:00:00.000+00:00",
"title": "CVE-2018-12699"
}
]
}
WID-SEC-W-2024-3470
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen f\u00fcr die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3470 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3470.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3470 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3470"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-11-14",
"url": "https://access.redhat.com/errata/RHSA-2024:9689"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9689 vom 2024-11-18",
"url": "http://linux.oracle.com/errata/ELSA-2024-9689.html"
}
],
"source_lang": "en-US",
"title": "binutils: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-11-17T23:00:00.000+00:00",
"generator": {
"date": "2024-11-18T09:04:43.374+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3470",
"initial_release_date": "2024-11-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source binutils",
"product": {
"name": "Open Source binutils",
"product_id": "T017623",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:binutils:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T034267",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12699",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in binutils aufgrund eines Heap-basierten Puffer\u00fcberlaufs in der Funktion stabs.c. Dies erm\u00f6glicht Out-of-Bounds Schreibzugriffe. Ein lokaler Angreifer kann diese Schwachstelle w\u00e4hrend der Ausf\u00fchrung von objdump ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen unspezifischen Angriff durchzuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T017623",
"T004914",
"T034267"
]
},
"release_date": "2024-11-14T23:00:00.000+00:00",
"title": "CVE-2018-12699"
}
]
}
ghsa-r4rx-vwmc-mj74
Vulnerability from github
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
{
"affected": [],
"aliases": [
"CVE-2018-12699"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-06-23T23:29:00Z",
"severity": "CRITICAL"
},
"details": "finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.",
"id": "GHSA-r4rx-vwmc-mj74",
"modified": "2022-05-14T00:55:07Z",
"published": "2022-05-14T00:55:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699"
},
{
"type": "WEB",
"url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
},
{
"type": "WEB",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201908-01"
},
{
"type": "WEB",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4336-1"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/104540"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.