Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-9077 (GCVE-0-2019-9077)
Vulnerability from cvelistv5 – Published: 2019-02-24 00:00 – Updated: 2024-08-04 21:38
VLAI?
EPSS
Summary
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
8 references
| URL | Tags |
|---|---|
| https://sourceware.org/bugzilla/show_bug.cgi?id=24243 | x_refsource_MISC |
| http://www.securityfocus.com/bid/107139 | vdb-entryx_refsource_BID |
| https://security.netapp.com/advisory/ntap-2019031… | x_refsource_CONFIRM |
| https://support.f5.com/csp/article/K00056379 | x_refsource_CONFIRM |
| https://usn.ubuntu.com/4336-1/ | vendor-advisoryx_refsource_UBUNTU |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| https://security.gentoo.org/glsa/202107-24 | vendor-advisoryx_refsource_GENTOO |
Date Public ?
2019-02-23 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T21:38:46.345Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"name": "107139",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107139"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"name": "USN-4336-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"name": "openSUSE-SU-2020:1790",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"name": "openSUSE-SU-2020:1804",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"name": "GLSA-202107-24",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202107-24"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2019-02-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-10T04:06:51.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"name": "107139",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107139"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"name": "USN-4336-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"name": "openSUSE-SU-2020:1790",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"name": "openSUSE-SU-2020:1804",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"name": "GLSA-202107-24",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202107-24"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9077",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"name": "107139",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107139"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190314-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"name": "https://support.f5.com/csp/article/K00056379",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"name": "openSUSE-SU-2020:1790",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"name": "openSUSE-SU-2020:1804",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"name": "GLSA-202107-24",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202107-24"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-9077",
"datePublished": "2019-02-24T00:00:00.000Z",
"dateReserved": "2019-02-23T00:00:00.000Z",
"dateUpdated": "2024-08-04T21:38:46.345Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-9077",
"date": "2026-05-20",
"epss": "0.00295",
"percentile": "0.52818"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A276274-BE53-4BC8-B3E4-3DF151E5FC7D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85DF4B3F-4BBC-42B7-B729-096934523D63\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.0.0\", \"versionEndIncluding\": \"5.1.0\", \"matchCriteriaId\": \"4E52F91D-3F39-4D89-8069-EC422FB1F700\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.\"}, {\"lang\": \"es\", \"value\": \"Se ha descubierto un problema en GNU Binutils 2.32. Es un desbordamiento de b\\u00fafer basado en memoria din\\u00e1mica (heap) en process_mips_specific en readelf.c mediante una secci\\u00f3n de opci\\u00f3n MIPS mal formada.\"}]",
"id": "CVE-2019-9077",
"lastModified": "2024-11-21T04:50:56.487",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-02-24T00:29:00.597",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107139\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://security.gentoo.org/glsa/202107-24\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190314-0003/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://sourceware.org/bugzilla/show_bug.cgi?id=24243\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K00056379\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4336-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107139\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://security.gentoo.org/glsa/202107-24\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190314-0003/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://sourceware.org/bugzilla/show_bug.cgi?id=24243\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K00056379\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4336-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-9077\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-02-24T00:29:00.597\",\"lastModified\":\"2024-11-21T04:50:56.487\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en GNU Binutils 2.32. Es un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en process_mips_specific en readelf.c mediante una secci\u00f3n de opci\u00f3n MIPS mal formada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A276274-BE53-4BC8-B3E4-3DF151E5FC7D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DF4B3F-4BBC-42B7-B729-096934523D63\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndIncluding\":\"5.1.0\",\"matchCriteriaId\":\"4E52F91D-3F39-4D89-8069-EC422FB1F700\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107139\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/202107-24\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190314-0003/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=24243\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K00056379\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/202107-24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190314-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=24243\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K00056379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4336-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
BDU:2023-03821
Vulnerability from fstec - Published: 20.02.2019
VLAI Severity ?
Title
Уязвимость функции process_mips_specific компонента binutils/readelf.c программного средства разработки GNU Binutils, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Description
Уязвимость функции process_mips_specific компонента binutils/readelf.c программного средства разработки GNU Binutils связана с записью за границами буфера. Эксплуатация уязвимости позволяет нарушителю, действующему удаленно, получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании с помощью специально созданного раздела опций MIPS
Severity ?
Vendor
ООО «РусБИТех-Астра», GNU General Public License, Сообщество свободного программного обеспечения, АО "НППКТ"
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), GNU Binutils, Debian GNU/Linux, Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156), ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
1.6 «Смоленск» (Astra Linux Special Edition), 2.32 (GNU Binutils), 10 (Debian GNU/Linux), 8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), до 2.3 (ОСОН ОСнова Оnyx)
Possible Mitigations
Для Binutils:
использование рекомендаций производителя: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7fc0c668f2aceb8582d74db1ad2528e2bba8a921
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2019-9077
Для ОС Astra Linux:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0630SE17MD
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения binutils до версии 2.31.1-16.osnova0u1
Для ОС Astra Linux Special Edition для архитектуры ARM 4.7:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0907SE47
Для Astra Linux Special Edition для «Эльбрус» 8.1 «Ленинград»:
обновить пакет binutils до 2.36-26.018 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81
Для Astra Linux Special Edition 1.6 «Смоленск»::
обновить пакет binutils до 2.28-5+ci202404091650+astra4 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16
Reference
https://nvd.nist.gov/vuln/detail/CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security-tracker.debian.org/tracker/CVE-2019-9077
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7fc0c668f2aceb8582d74db1ad2528e2bba8a921
https://support.f5.com/csp/article/K00056379
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0630SE17MD
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.3/
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0907SE47
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16
CWE
CWE-787
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, GNU General Public License, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 2.32 (GNU Binutils), 10 (Debian GNU/Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Binutils:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7fc0c668f2aceb8582d74db1ad2528e2bba8a921\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2019-9077\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0630SE17MD\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f binutils \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.31.1-16.osnova0u1\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM 4.7:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0907SE47\n\n\u0414\u043b\u044f Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 binutils \u0434\u043e 2.36-26.018 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81\n\n\u0414\u043b\u044f Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb::\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 binutils \u0434\u043e 2.28-5+ci202404091650+astra4 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "20.02.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "07.11.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.07.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-03821",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-9077",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), GNU Binutils, Debian GNU/Linux, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 process_mips_specific \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 binutils/readelf.c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 GNU Binutils, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0417\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-787)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 process_mips_specific \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 binutils/readelf.c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 GNU Binutils \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u0434\u0435\u043b\u0430 \u043e\u043f\u0446\u0438\u0439 MIPS",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077\nhttps://security.gentoo.org/glsa/202107-24\nhttps://security-tracker.debian.org/tracker/CVE-2019-9077\nhttps://sourceware.org/bugzilla/show_bug.cgi?id=24243\nhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7fc0c668f2aceb8582d74db1ad2528e2bba8a921\nhttps://support.f5.com/csp/article/K00056379\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0630SE17MD\n\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.3/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0907SE47\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-787",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2019-05784
Vulnerability from cnvd - Published: 2019-02-28
VLAI Severity ?
Title
GNU Binutils缓冲区溢出漏洞(CNVD-2019-05784)
Description
GNU Binutils(GNU Binary Utilities或binutils)是GNU计划的开发的一组编程语言工具程序。该程序主要用于处理多种格式的目标文件,并提供有连接器、汇编器和其他用于目标文件和档案的工具。
GNU Binutils 2.32版本中的readelf.c文件的‘process_mips_specific’函数存在缓冲区溢出漏洞。攻击者可利用该漏洞执行代码或造成拒绝服务。
Severity
中
Patch Name
GNU Binutils缓冲区溢出漏洞(CNVD-2019-05784)的补丁
Patch Description
GNU Binutils(GNU Binary Utilities或binutils)是GNU计划的开发的一组编程语言工具程序。该程序主要用于处理多种格式的目标文件,并提供有连接器、汇编器和其他用于目标文件和档案的工具。
GNU Binutils 2.32版本中的readelf.c文件的‘process_mips_specific’函数存在缓冲区溢出漏洞。攻击者可利用该漏洞执行代码或造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7fc0c668f2aceb8582d74db1ad2528e2bba8a921
Reference
https://nvd.nist.gov/vuln/detail/CVE-2019-9077
Impacted products
| Name | GNU Binutils 2.32 |
|---|
{
"bids": {
"bid": {
"bidNumber": "107139"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2019-9077"
}
},
"description": "GNU Binutils\uff08GNU Binary Utilities\u6216binutils\uff09\u662fGNU\u8ba1\u5212\u7684\u5f00\u53d1\u7684\u4e00\u7ec4\u7f16\u7a0b\u8bed\u8a00\u5de5\u5177\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u4e3b\u8981\u7528\u4e8e\u5904\u7406\u591a\u79cd\u683c\u5f0f\u7684\u76ee\u6807\u6587\u4ef6\uff0c\u5e76\u63d0\u4f9b\u6709\u8fde\u63a5\u5668\u3001\u6c47\u7f16\u5668\u548c\u5176\u4ed6\u7528\u4e8e\u76ee\u6807\u6587\u4ef6\u548c\u6863\u6848\u7684\u5de5\u5177\u3002\n\nGNU Binutils 2.32\u7248\u672c\u4e2d\u7684readelf.c\u6587\u4ef6\u7684\u2018process_mips_specific\u2019\u51fd\u6570\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "spinpx",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7fc0c668f2aceb8582d74db1ad2528e2bba8a921",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-05784",
"openTime": "2019-02-28",
"patchDescription": "GNU Binutils\uff08GNU Binary Utilities\u6216binutils\uff09\u662fGNU\u8ba1\u5212\u7684\u5f00\u53d1\u7684\u4e00\u7ec4\u7f16\u7a0b\u8bed\u8a00\u5de5\u5177\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u4e3b\u8981\u7528\u4e8e\u5904\u7406\u591a\u79cd\u683c\u5f0f\u7684\u76ee\u6807\u6587\u4ef6\uff0c\u5e76\u63d0\u4f9b\u6709\u8fde\u63a5\u5668\u3001\u6c47\u7f16\u5668\u548c\u5176\u4ed6\u7528\u4e8e\u76ee\u6807\u6587\u4ef6\u548c\u6863\u6848\u7684\u5de5\u5177\u3002\r\n\r\nGNU Binutils 2.32\u7248\u672c\u4e2d\u7684readelf.c\u6587\u4ef6\u7684\u2018process_mips_specific\u2019\u51fd\u6570\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "GNU Binutils\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-05784\uff09\u7684\u8865\u4e01",
"products": {
"product": "GNU Binutils 2.32"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077",
"serverity": "\u4e2d",
"submitTime": "2019-02-25",
"title": "GNU Binutils\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-05784\uff09"
}
FKIE_CVE-2019-9077
Vulnerability from fkie_nvd - Published: 2019-02-24 00:29 - Updated: 2024-11-21 04:50
Severity ?
Summary
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| gnu | binutils | 2.32 | |
| netapp | element_software | - | |
| canonical | ubuntu_linux | 18.04 | |
| f5 | traffix_signaling_delivery_controller | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "8A276274-BE53-4BC8-B3E4-3DF151E5FC7D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85DF4B3F-4BBC-42B7-B729-096934523D63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E52F91D-3F39-4D89-8069-EC422FB1F700",
"versionEndIncluding": "5.1.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en GNU Binutils 2.32. Es un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en process_mips_specific en readelf.c mediante una secci\u00f3n de opci\u00f3n MIPS mal formada."
}
],
"id": "CVE-2019-9077",
"lastModified": "2024-11-21T04:50:56.487",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-02-24T00:29:00.597",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107139"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202107-24"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202107-24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4336-1/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-F85V-VF98-9GHH
Vulnerability from github – Published: 2022-05-13 01:04 – Updated: 2022-05-13 01:04
VLAI?
Details
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2019-9077"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-02-24T00:29:00Z",
"severity": "HIGH"
},
"details": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"id": "GHSA-f85v-vf98-9ghh",
"modified": "2022-05-13T01:04:40Z",
"published": "2022-05-13T01:04:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202107-24"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20190314-0003"
},
{
"type": "WEB",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4336-1"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/107139"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2019-9077
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-9077",
"description": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"id": "GSD-2019-9077",
"references": [
"https://www.suse.com/security/cve/CVE-2019-9077.html",
"https://ubuntu.com/security/CVE-2019-9077",
"https://advisories.mageia.org/CVE-2019-9077.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-9077"
],
"details": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"id": "GSD-2019-9077",
"modified": "2023-12-13T01:23:47.383802Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9077",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"name": "107139",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107139"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190314-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"name": "https://support.f5.com/csp/article/K00056379",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"name": "openSUSE-SU-2020:1790",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"name": "openSUSE-SU-2020:1804",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"name": "GLSA-202107-24",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202107-24"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9077"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
},
{
"name": "107139",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107139"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190314-0003/",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
},
{
"name": "https://support.f5.com/csp/article/K00056379",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K00056379"
},
{
"name": "USN-4336-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4336-1/"
},
{
"name": "openSUSE-SU-2020:1804",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
},
{
"name": "openSUSE-SU-2020:1790",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
},
{
"name": "GLSA-202107-24",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202107-24"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-08-16T14:17Z",
"publishedDate": "2019-02-24T00:29Z"
}
}
}
MSRC_CVE-2019-9077
Vulnerability from csaf_microsoft - Published: 2019-02-02 00:00 - Updated: 2020-08-18 00:00Summary
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
References
4 references
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2019/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2019/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2019-9077 An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2019/msrc_cve-2019-9077.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"tracking": {
"current_release_date": "2020-08-18T00:00:00.000Z",
"generator": {
"date": "2025-10-19T17:29:25.010Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2019-9077",
"initial_release_date": "2019-02-02T00:00:00.000Z",
"revision_history": [
{
"date": "2020-08-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 binutils 2.32-3",
"product": {
"name": "\u003ccm1 binutils 2.32-3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 binutils 2.32-3",
"product": {
"name": "cm1 binutils 2.32-3",
"product_id": "17076"
}
}
],
"category": "product_name",
"name": "binutils"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 binutils 2.32-3 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 binutils 2.32-3 as a component of CBL Mariner 1.0",
"product_id": "17076-16820"
},
"product_reference": "17076",
"relates_to_product_reference": "16820"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9077",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17076-16820"
],
"known_affected": [
"16820-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-9077 An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2019/msrc_cve-2019-9077.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2020-08-18T00:00:00.000Z",
"details": "2.32-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-1"
]
}
],
"title": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section."
}
]
}
OPENSUSE-SU-2020:1790-1
Vulnerability from csaf_opensuse - Published: 2020-10-31 13:22 - Updated: 2020-10-31 13:22Summary
Security update for binutils
Severity
Moderate
Notes
Title of the patch: Security update for binutils
Description of the patch: This update for binutils fixes the following issues:
binutils was updated to version 2.35. (jsc#ECO-2373)
Update to binutils 2.35:
* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.
The old behaviour - of displaying as many characters as possible, up to
the 80 column limit - can be restored by the use of the --silent-truncation
option.
* The linker can now produce a dependency file listing the inputs that it
has processed, much like the -M -MP option supported by the compiler.
- fix DT_NEEDED order with -flto [bsc#1163744]
Update to binutils 2.34:
* The disassembler (objdump --disassemble) now has an option to
generate ascii art thats show the arcs between that start and end
points of control flow instructions.
* The binutils tools now have support for debuginfod. Debuginfod is a
HTTP service for distributing ELF/DWARF debugging information as
well as source code. The tools can now connect to debuginfod
servers in order to download debug information about the files that
they are processing.
* The assembler and linker now support the generation of ELF format
files for the Z80 architecture.
- Add new subpackages for libctf and libctf-nobfd.
- Disable LTO due to bsc#1163333.
- Includes fixes for these CVEs:
bsc#1153768 aka CVE-2019-17451 aka PR25070
bsc#1153770 aka CVE-2019-17450 aka PR25078
- fix various build fails on aarch64 (PR25210, bsc#1157755).
Update to binutils 2.33.1:
* Adds support for the Arm Scalable Vector Extension version 2
(SVE2) instructions, the Arm Transactional Memory Extension (TME)
instructions and the Armv8.1-M Mainline and M-profile Vector
Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes|no]
configure time option to set the default behavior. Set the default
if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
which workaround to use. The option --fix-cortex-a53-843419 now
takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
which can be used to force a particular workaround to be used.
See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties
in the AArch64 ELF linker.
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=<txt>] option to objdump which if present,
provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment <section-name>=<power-of-2-align>
option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
and --debug-dump=follow) and objdump (--dwarf=links and
--dwarf=follow-links) will now display and/or follow multiple
links if more than one are present in a file. (This usually
happens when gcc's -gsplit-dwarf option is used).
In addition objdump's --dwarf=follow-links now also affects its
other display options, so that for example, when combined with
--syms it will cause the symbol tables in any linked debug info
files to also be displayed. In addition when combined with
--disassemble the --dwarf= follow-links option will ensure that
any symbol tables in the linked files are read and used when
disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
to objdump and readelf.
- Includes fixes for these CVEs:
bsc#1126826 aka CVE-2019-9077 aka PR1126826
bsc#1126829 aka CVE-2019-9075 aka PR1126829
bsc#1126831 aka CVE-2019-9074 aka PR24235
bsc#1140126 aka CVE-2019-12972 aka PR23405
bsc#1143609 aka CVE-2019-14444 aka PR24829
bsc#1142649 aka CVE-2019-14250 aka PR90924
* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames: openSUSE-2020-1790
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.2 (Medium)
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.3 (Medium)
Affected products
Recommended
31 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
43 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to version 2.35. (jsc#ECO-2373)\n\nUpdate to binutils 2.35:\n\n* The assembler can now produce DWARF-5 format line number tables.\n* Readelf now has a \u0027lint\u0027 mode to enable extra checks of the files it is processing.\n* Readelf will now display \u0027[...]\u0027 when it has to truncate a symbol name. \n The old behaviour - of displaying as many characters as possible, up to\n the 80 column limit - can be restored by the use of the --silent-truncation\n option.\n* The linker can now produce a dependency file listing the inputs that it\n has processed, much like the -M -MP option supported by the compiler.\n\n- fix DT_NEEDED order with -flto [bsc#1163744]\n\n\nUpdate to binutils 2.34:\n\n* The disassembler (objdump --disassemble) now has an option to\n generate ascii art thats show the arcs between that start and end\n points of control flow instructions.\n* The binutils tools now have support for debuginfod. Debuginfod is a \n HTTP service for distributing ELF/DWARF debugging information as\n well as source code. The tools can now connect to debuginfod\n servers in order to download debug information about the files that\n they are processing.\n* The assembler and linker now support the generation of ELF format\n files for the Z80 architecture.\n\n- Add new subpackages for libctf and libctf-nobfd.\n- Disable LTO due to bsc#1163333.\n- Includes fixes for these CVEs:\n bsc#1153768 aka CVE-2019-17451 aka PR25070\n bsc#1153770 aka CVE-2019-17450 aka PR25078\n\n- fix various build fails on aarch64 (PR25210, bsc#1157755).\n\nUpdate to binutils 2.33.1:\n\n* Adds support for the Arm Scalable Vector Extension version 2\n (SVE2) instructions, the Arm Transactional Memory Extension (TME)\n instructions and the Armv8.1-M Mainline and M-profile Vector\n Extension (MVE) instructions.\n* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P\n processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,\n Cortex-A76AE, and Cortex-A77 processors.\n* Adds a .float16 directive for both Arm and AArch64 to allow\n encoding of 16-bit floating point literals.\n* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)\n Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes|no]\n configure time option to set the default behavior. Set the default\n if the configure option is not used to \u0027no\u0027.\n* The Cortex-A53 Erratum 843419 workaround now supports a choice of\n which workaround to use. The option --fix-cortex-a53-843419 now\n takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]\n which can be used to force a particular workaround to be used.\n See --help for AArch64 for more details.\n* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and\n GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties\n in the AArch64 ELF linker. \n* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI\n on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI \n on inputs and use PLTs protected with BTI.\n* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.\n* Add --source-comment[=\u003ctxt\u003e] option to objdump which if present,\n provides a prefix to source code lines displayed in a disassembly.\n* Add --set-section-alignment \u003csection-name\u003e=\u003cpower-of-2-align\u003e\n option to objcopy to allow the changing of section alignments.\n* Add --verilog-data-width option to objcopy for verilog targets to\n control width of data elements in verilog hex format.\n* The separate debug info file options of readelf (--debug-dump=links\n and --debug-dump=follow) and objdump (--dwarf=links and\n --dwarf=follow-links) will now display and/or follow multiple\n links if more than one are present in a file. (This usually\n happens when gcc\u0027s -gsplit-dwarf option is used).\n In addition objdump\u0027s --dwarf=follow-links now also affects its\n other display options, so that for example, when combined with\n --syms it will cause the symbol tables in any linked debug info\n files to also be displayed. In addition when combined with\n --disassemble the --dwarf= follow-links option will ensure that\n any symbol tables in the linked files are read and used when\n disassembling code in the main file.\n* Add support for dumping types encoded in the Compact Type Format\n to objdump and readelf.\n- Includes fixes for these CVEs:\n bsc#1126826 aka CVE-2019-9077 aka PR1126826\n bsc#1126829 aka CVE-2019-9075 aka PR1126829\n bsc#1126831 aka CVE-2019-9074 aka PR24235\n bsc#1140126 aka CVE-2019-12972 aka PR23405\n bsc#1143609 aka CVE-2019-14444 aka PR24829\n bsc#1142649 aka CVE-2019-14250 aka PR90924\n\n* Add xBPF target\n* Fix various problems with DWARF 5 support in gas\n* fix nm -B for objects compiled with -flto and -fcommon.\n\n \nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1790",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1790-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1790-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AYODXTIQHTHANYSEI73JBXTPH244JTOU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1790-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AYODXTIQHTHANYSEI73JBXTPH244JTOU/"
},
{
"category": "self",
"summary": "SUSE Bug 1126826",
"url": "https://bugzilla.suse.com/1126826"
},
{
"category": "self",
"summary": "SUSE Bug 1126829",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "self",
"summary": "SUSE Bug 1126831",
"url": "https://bugzilla.suse.com/1126831"
},
{
"category": "self",
"summary": "SUSE Bug 1140126",
"url": "https://bugzilla.suse.com/1140126"
},
{
"category": "self",
"summary": "SUSE Bug 1142649",
"url": "https://bugzilla.suse.com/1142649"
},
{
"category": "self",
"summary": "SUSE Bug 1143609",
"url": "https://bugzilla.suse.com/1143609"
},
{
"category": "self",
"summary": "SUSE Bug 1153768",
"url": "https://bugzilla.suse.com/1153768"
},
{
"category": "self",
"summary": "SUSE Bug 1153770",
"url": "https://bugzilla.suse.com/1153770"
},
{
"category": "self",
"summary": "SUSE Bug 1157755",
"url": "https://bugzilla.suse.com/1157755"
},
{
"category": "self",
"summary": "SUSE Bug 1160254",
"url": "https://bugzilla.suse.com/1160254"
},
{
"category": "self",
"summary": "SUSE Bug 1160590",
"url": "https://bugzilla.suse.com/1160590"
},
{
"category": "self",
"summary": "SUSE Bug 1163333",
"url": "https://bugzilla.suse.com/1163333"
},
{
"category": "self",
"summary": "SUSE Bug 1163744",
"url": "https://bugzilla.suse.com/1163744"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12972 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14250 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14444 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17451 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9074 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9075 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9077 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9077/"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2020-10-31T13:22:55Z",
"generator": {
"date": "2020-10-31T13:22:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1790-1",
"initial_release_date": "2020-10-31T13:22:55Z",
"revision_history": [
{
"date": "2020-10-31T13:22:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-lp151.3.9.1.i586",
"product": {
"name": "binutils-2.35-lp151.3.9.1.i586",
"product_id": "binutils-2.35-lp151.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-lp151.3.9.1.i586",
"product": {
"name": "binutils-devel-2.35-lp151.3.9.1.i586",
"product_id": "binutils-devel-2.35-lp151.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-lp151.3.9.1.i586",
"product": {
"name": "binutils-gold-2.35-lp151.3.9.1.i586",
"product_id": "binutils-gold-2.35-lp151.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-lp151.3.9.1.i586",
"product": {
"name": "libctf-nobfd0-2.35-lp151.3.9.1.i586",
"product_id": "libctf-nobfd0-2.35-lp151.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-lp151.3.9.1.i586",
"product": {
"name": "libctf0-2.35-lp151.3.9.1.i586",
"product_id": "libctf0-2.35-lp151.3.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "binutils-devel-2.35-lp151.3.9.1.x86_64",
"product_id": "binutils-devel-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"product_id": "binutils-devel-32bit-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "binutils-gold-2.35-lp151.3.9.1.x86_64",
"product_id": "binutils-gold-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-arm-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-avr-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-hppa-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-i386-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-ia64-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-m68k-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-mips-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-ppc-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-rx-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-s390-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-s390x-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-sparc-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"product_id": "cross-spu-binutils-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"product_id": "libctf-nobfd0-2.35-lp151.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-lp151.3.9.1.x86_64",
"product": {
"name": "libctf0-2.35-lp151.3.9.1.x86_64",
"product_id": "libctf0-2.35-lp151.3.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-lp151.3.9.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586"
},
"product_reference": "binutils-2.35-lp151.3.9.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-lp151.3.9.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586"
},
"product_reference": "binutils-devel-2.35-lp151.3.9.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "binutils-devel-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-lp151.3.9.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586"
},
"product_reference": "binutils-gold-2.35-lp151.3.9.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "binutils-gold-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-arm-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-avr-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-hppa-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-i386-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ia64-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-m68k-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-mips-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-rx-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-s390-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-s390x-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-sparc-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-lp151.3.9.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586"
},
"product_reference": "libctf-nobfd0-2.35-lp151.3.9.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-lp151.3.9.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586"
},
"product_reference": "libctf0-2.35-lp151.3.9.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-lp151.3.9.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
},
"product_reference": "libctf0-2.35-lp151.3.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12972",
"url": "https://www.suse.com/security/cve/CVE-2019-12972"
},
{
"category": "external",
"summary": "SUSE Bug 1140126 for CVE-2019-12972",
"url": "https://bugzilla.suse.com/1140126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-12972"
},
{
"cve": "CVE-2019-14250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14250"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14250",
"url": "https://www.suse.com/security/cve/CVE-2019-14250"
},
{
"category": "external",
"summary": "SUSE Bug 1142649 for CVE-2019-14250",
"url": "https://bugzilla.suse.com/1142649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-14250"
},
{
"cve": "CVE-2019-14444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14444"
}
],
"notes": [
{
"category": "general",
"text": "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14444",
"url": "https://www.suse.com/security/cve/CVE-2019-14444"
},
{
"category": "external",
"summary": "SUSE Bug 1143609 for CVE-2019-14444",
"url": "https://bugzilla.suse.com/1143609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "low"
}
],
"title": "CVE-2019-14444"
},
{
"cve": "CVE-2019-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17450"
}
],
"notes": [
{
"category": "general",
"text": "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17450",
"url": "https://www.suse.com/security/cve/CVE-2019-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1153770 for CVE-2019-17450",
"url": "https://bugzilla.suse.com/1153770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "low"
}
],
"title": "CVE-2019-17450"
},
{
"cve": "CVE-2019-17451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17451"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17451",
"url": "https://www.suse.com/security/cve/CVE-2019-17451"
},
{
"category": "external",
"summary": "SUSE Bug 1153768 for CVE-2019-17451",
"url": "https://bugzilla.suse.com/1153768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "low"
}
],
"title": "CVE-2019-17451"
},
{
"cve": "CVE-2019-9074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9074"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9074",
"url": "https://www.suse.com/security/cve/CVE-2019-9074"
},
{
"category": "external",
"summary": "SUSE Bug 1126831 for CVE-2019-9074",
"url": "https://bugzilla.suse.com/1126831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-9074"
},
{
"cve": "CVE-2019-9075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9075"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9075",
"url": "https://www.suse.com/security/cve/CVE-2019-9075"
},
{
"category": "external",
"summary": "SUSE Bug 1071544 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1071544"
},
{
"category": "external",
"summary": "SUSE Bug 1126829 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "external",
"summary": "SUSE Bug 1193110 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1193110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "low"
}
],
"title": "CVE-2019-9075"
},
{
"cve": "CVE-2019-9077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9077"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9077",
"url": "https://www.suse.com/security/cve/CVE-2019-9077"
},
{
"category": "external",
"summary": "SUSE Bug 1126826 for CVE-2019-9077",
"url": "https://bugzilla.suse.com/1126826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-devel-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-devel-32bit-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:binutils-gold-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-aarch64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-arm-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-avr-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-epiphany-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-hppa64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-i386-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ia64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-m68k-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-mips-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-ppc64le-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-riscv64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-rx-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-s390x-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-sparc64-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:cross-spu-binutils-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf-nobfd0-2.35-lp151.3.9.1.x86_64",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.i586",
"openSUSE Leap 15.1:libctf0-2.35-lp151.3.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-31T13:22:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-9077"
}
]
}
OPENSUSE-SU-2020:1804-1
Vulnerability from csaf_opensuse - Published: 2020-11-01 09:23 - Updated: 2020-11-01 09:23Summary
Security update for binutils
Severity
Moderate
Notes
Title of the patch: Security update for binutils
Description of the patch: This update for binutils fixes the following issues:
binutils was updated to version 2.35. (jsc#ECO-2373)
Update to binutils 2.35:
* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.
The old behaviour - of displaying as many characters as possible, up to
the 80 column limit - can be restored by the use of the --silent-truncation
option.
* The linker can now produce a dependency file listing the inputs that it
has processed, much like the -M -MP option supported by the compiler.
- fix DT_NEEDED order with -flto [bsc#1163744]
Update to binutils 2.34:
* The disassembler (objdump --disassemble) now has an option to
generate ascii art thats show the arcs between that start and end
points of control flow instructions.
* The binutils tools now have support for debuginfod. Debuginfod is a
HTTP service for distributing ELF/DWARF debugging information as
well as source code. The tools can now connect to debuginfod
servers in order to download debug information about the files that
they are processing.
* The assembler and linker now support the generation of ELF format
files for the Z80 architecture.
- Add new subpackages for libctf and libctf-nobfd.
- Disable LTO due to bsc#1163333.
- Includes fixes for these CVEs:
bsc#1153768 aka CVE-2019-17451 aka PR25070
bsc#1153770 aka CVE-2019-17450 aka PR25078
- fix various build fails on aarch64 (PR25210, bsc#1157755).
Update to binutils 2.33.1:
* Adds support for the Arm Scalable Vector Extension version 2
(SVE2) instructions, the Arm Transactional Memory Extension (TME)
instructions and the Armv8.1-M Mainline and M-profile Vector
Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes|no]
configure time option to set the default behavior. Set the default
if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
which workaround to use. The option --fix-cortex-a53-843419 now
takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
which can be used to force a particular workaround to be used.
See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties
in the AArch64 ELF linker.
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=<txt>] option to objdump which if present,
provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment <section-name>=<power-of-2-align>
option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
and --debug-dump=follow) and objdump (--dwarf=links and
--dwarf=follow-links) will now display and/or follow multiple
links if more than one are present in a file. (This usually
happens when gcc's -gsplit-dwarf option is used).
In addition objdump's --dwarf=follow-links now also affects its
other display options, so that for example, when combined with
--syms it will cause the symbol tables in any linked debug info
files to also be displayed. In addition when combined with
--disassemble the --dwarf= follow-links option will ensure that
any symbol tables in the linked files are read and used when
disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
to objdump and readelf.
- Includes fixes for these CVEs:
bsc#1126826 aka CVE-2019-9077 aka PR1126826
bsc#1126829 aka CVE-2019-9075 aka PR1126829
bsc#1126831 aka CVE-2019-9074 aka PR24235
bsc#1140126 aka CVE-2019-12972 aka PR23405
bsc#1143609 aka CVE-2019-14444 aka PR24829
bsc#1142649 aka CVE-2019-14250 aka PR90924
* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames: openSUSE-2020-1804
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.2 (Medium)
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.3 (Medium)
Affected products
Recommended
32 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
43 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to version 2.35. (jsc#ECO-2373)\n\nUpdate to binutils 2.35:\n\n* The assembler can now produce DWARF-5 format line number tables.\n* Readelf now has a \u0027lint\u0027 mode to enable extra checks of the files it is processing.\n* Readelf will now display \u0027[...]\u0027 when it has to truncate a symbol name. \n The old behaviour - of displaying as many characters as possible, up to\n the 80 column limit - can be restored by the use of the --silent-truncation\n option.\n* The linker can now produce a dependency file listing the inputs that it\n has processed, much like the -M -MP option supported by the compiler.\n\n- fix DT_NEEDED order with -flto [bsc#1163744]\n\n\nUpdate to binutils 2.34:\n\n* The disassembler (objdump --disassemble) now has an option to\n generate ascii art thats show the arcs between that start and end\n points of control flow instructions.\n* The binutils tools now have support for debuginfod. Debuginfod is a \n HTTP service for distributing ELF/DWARF debugging information as\n well as source code. The tools can now connect to debuginfod\n servers in order to download debug information about the files that\n they are processing.\n* The assembler and linker now support the generation of ELF format\n files for the Z80 architecture.\n\n- Add new subpackages for libctf and libctf-nobfd.\n- Disable LTO due to bsc#1163333.\n- Includes fixes for these CVEs:\n bsc#1153768 aka CVE-2019-17451 aka PR25070\n bsc#1153770 aka CVE-2019-17450 aka PR25078\n\n- fix various build fails on aarch64 (PR25210, bsc#1157755).\n\nUpdate to binutils 2.33.1:\n\n* Adds support for the Arm Scalable Vector Extension version 2\n (SVE2) instructions, the Arm Transactional Memory Extension (TME)\n instructions and the Armv8.1-M Mainline and M-profile Vector\n Extension (MVE) instructions.\n* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P\n processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,\n Cortex-A76AE, and Cortex-A77 processors.\n* Adds a .float16 directive for both Arm and AArch64 to allow\n encoding of 16-bit floating point literals.\n* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)\n Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes|no]\n configure time option to set the default behavior. Set the default\n if the configure option is not used to \u0027no\u0027.\n* The Cortex-A53 Erratum 843419 workaround now supports a choice of\n which workaround to use. The option --fix-cortex-a53-843419 now\n takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]\n which can be used to force a particular workaround to be used.\n See --help for AArch64 for more details.\n* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and\n GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties\n in the AArch64 ELF linker. \n* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI\n on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI \n on inputs and use PLTs protected with BTI.\n* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.\n* Add --source-comment[=\u003ctxt\u003e] option to objdump which if present,\n provides a prefix to source code lines displayed in a disassembly.\n* Add --set-section-alignment \u003csection-name\u003e=\u003cpower-of-2-align\u003e\n option to objcopy to allow the changing of section alignments.\n* Add --verilog-data-width option to objcopy for verilog targets to\n control width of data elements in verilog hex format.\n* The separate debug info file options of readelf (--debug-dump=links\n and --debug-dump=follow) and objdump (--dwarf=links and\n --dwarf=follow-links) will now display and/or follow multiple\n links if more than one are present in a file. (This usually\n happens when gcc\u0027s -gsplit-dwarf option is used).\n In addition objdump\u0027s --dwarf=follow-links now also affects its\n other display options, so that for example, when combined with\n --syms it will cause the symbol tables in any linked debug info\n files to also be displayed. In addition when combined with\n --disassemble the --dwarf= follow-links option will ensure that\n any symbol tables in the linked files are read and used when\n disassembling code in the main file.\n* Add support for dumping types encoded in the Compact Type Format\n to objdump and readelf.\n- Includes fixes for these CVEs:\n bsc#1126826 aka CVE-2019-9077 aka PR1126826\n bsc#1126829 aka CVE-2019-9075 aka PR1126829\n bsc#1126831 aka CVE-2019-9074 aka PR24235\n bsc#1140126 aka CVE-2019-12972 aka PR23405\n bsc#1143609 aka CVE-2019-14444 aka PR24829\n bsc#1142649 aka CVE-2019-14250 aka PR90924\n\n* Add xBPF target\n* Fix various problems with DWARF 5 support in gas\n* fix nm -B for objects compiled with -flto and -fcommon.\n\n \nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1804",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1804-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1804-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HD525V55IWCMFIZABVL2WPYZ3F73Y4RP/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1804-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HD525V55IWCMFIZABVL2WPYZ3F73Y4RP/"
},
{
"category": "self",
"summary": "SUSE Bug 1126826",
"url": "https://bugzilla.suse.com/1126826"
},
{
"category": "self",
"summary": "SUSE Bug 1126829",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "self",
"summary": "SUSE Bug 1126831",
"url": "https://bugzilla.suse.com/1126831"
},
{
"category": "self",
"summary": "SUSE Bug 1140126",
"url": "https://bugzilla.suse.com/1140126"
},
{
"category": "self",
"summary": "SUSE Bug 1142649",
"url": "https://bugzilla.suse.com/1142649"
},
{
"category": "self",
"summary": "SUSE Bug 1143609",
"url": "https://bugzilla.suse.com/1143609"
},
{
"category": "self",
"summary": "SUSE Bug 1153768",
"url": "https://bugzilla.suse.com/1153768"
},
{
"category": "self",
"summary": "SUSE Bug 1153770",
"url": "https://bugzilla.suse.com/1153770"
},
{
"category": "self",
"summary": "SUSE Bug 1157755",
"url": "https://bugzilla.suse.com/1157755"
},
{
"category": "self",
"summary": "SUSE Bug 1160254",
"url": "https://bugzilla.suse.com/1160254"
},
{
"category": "self",
"summary": "SUSE Bug 1160590",
"url": "https://bugzilla.suse.com/1160590"
},
{
"category": "self",
"summary": "SUSE Bug 1163333",
"url": "https://bugzilla.suse.com/1163333"
},
{
"category": "self",
"summary": "SUSE Bug 1163744",
"url": "https://bugzilla.suse.com/1163744"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12972 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14250 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14444 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17451 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9074 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9075 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9077 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9077/"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2020-11-01T09:23:38Z",
"generator": {
"date": "2020-11-01T09:23:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1804-1",
"initial_release_date": "2020-11-01T09:23:38Z",
"revision_history": [
{
"date": "2020-11-01T09:23:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-lp152.4.3.1.i586",
"product": {
"name": "binutils-2.35-lp152.4.3.1.i586",
"product_id": "binutils-2.35-lp152.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-lp152.4.3.1.i586",
"product": {
"name": "binutils-devel-2.35-lp152.4.3.1.i586",
"product_id": "binutils-devel-2.35-lp152.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-lp152.4.3.1.i586",
"product": {
"name": "binutils-gold-2.35-lp152.4.3.1.i586",
"product_id": "binutils-gold-2.35-lp152.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-lp152.4.3.1.i586",
"product": {
"name": "libctf-nobfd0-2.35-lp152.4.3.1.i586",
"product_id": "libctf-nobfd0-2.35-lp152.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-lp152.4.3.1.i586",
"product": {
"name": "libctf0-2.35-lp152.4.3.1.i586",
"product_id": "libctf0-2.35-lp152.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "binutils-devel-2.35-lp152.4.3.1.x86_64",
"product_id": "binutils-devel-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"product_id": "binutils-devel-32bit-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "binutils-gold-2.35-lp152.4.3.1.x86_64",
"product_id": "binutils-gold-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-arm-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-avr-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-hppa-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-i386-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-ia64-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-m68k-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-mips-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-ppc-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-rx-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-s390-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-s390x-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-sparc-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-spu-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"product_id": "cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"product_id": "libctf-nobfd0-2.35-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-lp152.4.3.1.x86_64",
"product": {
"name": "libctf0-2.35-lp152.4.3.1.x86_64",
"product_id": "libctf0-2.35-lp152.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586"
},
"product_reference": "binutils-2.35-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586"
},
"product_reference": "binutils-devel-2.35-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "binutils-devel-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586"
},
"product_reference": "binutils-gold-2.35-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "binutils-gold-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-arm-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-avr-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-hppa-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-i386-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ia64-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-m68k-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-mips-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-rx-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-s390-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-s390x-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-sparc-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-spu-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586"
},
"product_reference": "libctf-nobfd0-2.35-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586"
},
"product_reference": "libctf0-2.35-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
},
"product_reference": "libctf0-2.35-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12972",
"url": "https://www.suse.com/security/cve/CVE-2019-12972"
},
{
"category": "external",
"summary": "SUSE Bug 1140126 for CVE-2019-12972",
"url": "https://bugzilla.suse.com/1140126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-12972"
},
{
"cve": "CVE-2019-14250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14250"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14250",
"url": "https://www.suse.com/security/cve/CVE-2019-14250"
},
{
"category": "external",
"summary": "SUSE Bug 1142649 for CVE-2019-14250",
"url": "https://bugzilla.suse.com/1142649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-14250"
},
{
"cve": "CVE-2019-14444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14444"
}
],
"notes": [
{
"category": "general",
"text": "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14444",
"url": "https://www.suse.com/security/cve/CVE-2019-14444"
},
{
"category": "external",
"summary": "SUSE Bug 1143609 for CVE-2019-14444",
"url": "https://bugzilla.suse.com/1143609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "low"
}
],
"title": "CVE-2019-14444"
},
{
"cve": "CVE-2019-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17450"
}
],
"notes": [
{
"category": "general",
"text": "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17450",
"url": "https://www.suse.com/security/cve/CVE-2019-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1153770 for CVE-2019-17450",
"url": "https://bugzilla.suse.com/1153770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "low"
}
],
"title": "CVE-2019-17450"
},
{
"cve": "CVE-2019-17451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17451"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17451",
"url": "https://www.suse.com/security/cve/CVE-2019-17451"
},
{
"category": "external",
"summary": "SUSE Bug 1153768 for CVE-2019-17451",
"url": "https://bugzilla.suse.com/1153768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "low"
}
],
"title": "CVE-2019-17451"
},
{
"cve": "CVE-2019-9074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9074"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9074",
"url": "https://www.suse.com/security/cve/CVE-2019-9074"
},
{
"category": "external",
"summary": "SUSE Bug 1126831 for CVE-2019-9074",
"url": "https://bugzilla.suse.com/1126831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-9074"
},
{
"cve": "CVE-2019-9075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9075"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9075",
"url": "https://www.suse.com/security/cve/CVE-2019-9075"
},
{
"category": "external",
"summary": "SUSE Bug 1071544 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1071544"
},
{
"category": "external",
"summary": "SUSE Bug 1126829 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "external",
"summary": "SUSE Bug 1193110 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1193110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "low"
}
],
"title": "CVE-2019-9075"
},
{
"cve": "CVE-2019-9077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9077"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9077",
"url": "https://www.suse.com/security/cve/CVE-2019-9077"
},
{
"category": "external",
"summary": "SUSE Bug 1126826 for CVE-2019-9077",
"url": "https://bugzilla.suse.com/1126826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-devel-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-devel-32bit-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:binutils-gold-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-aarch64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-arm-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-avr-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-epiphany-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-hppa64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-i386-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ia64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-m68k-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-mips-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-ppc64le-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-riscv64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-rx-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-s390x-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-sparc64-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-spu-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:cross-xtensa-binutils-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf-nobfd0-2.35-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libctf0-2.35-lp152.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-01T09:23:38Z",
"details": "moderate"
}
],
"title": "CVE-2019-9077"
}
]
}
OPENSUSE-SU-2024:10651-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
binutils-2.37-1.3 on GA media
Severity
Moderate
Notes
Title of the patch: binutils-2.37-1.3 on GA media
Description of the patch: These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10651
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
9.8 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
5.9 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.9 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4.4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.9 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.3 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.2 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.3 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.7 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
366 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "binutils-2.37-1.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10651",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10651-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9939 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12452 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12453 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12454 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12456 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12799 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13757 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14128 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14130 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14333 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14529 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14729 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14745 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14974 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15938 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16826 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16826/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16827 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16827/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16828 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16829 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16830 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16832 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6965 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6965/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6966 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6969 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7209 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7210 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7223 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7224 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7225 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7226 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7299 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7299/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7300 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7301 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7302 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7303 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7304 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8392 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8393 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8394 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8396 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8421 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9746 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9747 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9748 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9750 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9755 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9756 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10372 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10373 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10534 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10535 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18309 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18484 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18605 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18606 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18607 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19931 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19932 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20623 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20651 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20671 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6543 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6759 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7208 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7569 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7570 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7642 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7643 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7643/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8945 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1010180 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12972 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14250 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14444 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17451 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9074 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9075 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9077 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16590 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16591 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16592 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16593 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16598 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16599 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35448 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35493 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35493/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35496 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35496/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35507 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20197 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20284 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3487 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3487/"
}
],
"title": "binutils-2.37-1.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10651-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.aarch64",
"product": {
"name": "binutils-2.37-1.3.aarch64",
"product_id": "binutils-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.aarch64",
"product": {
"name": "binutils-devel-2.37-1.3.aarch64",
"product_id": "binutils-devel-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.aarch64",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.aarch64",
"product_id": "binutils-devel-32bit-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.aarch64",
"product": {
"name": "binutils-gold-2.37-1.3.aarch64",
"product_id": "binutils-gold-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.aarch64",
"product": {
"name": "libctf-nobfd0-2.37-1.3.aarch64",
"product_id": "libctf-nobfd0-2.37-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.aarch64",
"product": {
"name": "libctf0-2.37-1.3.aarch64",
"product_id": "libctf0-2.37-1.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.ppc64le",
"product": {
"name": "binutils-2.37-1.3.ppc64le",
"product_id": "binutils-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.ppc64le",
"product": {
"name": "binutils-devel-2.37-1.3.ppc64le",
"product_id": "binutils-devel-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.ppc64le",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.ppc64le",
"product_id": "binutils-devel-32bit-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.ppc64le",
"product": {
"name": "binutils-gold-2.37-1.3.ppc64le",
"product_id": "binutils-gold-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.ppc64le",
"product": {
"name": "libctf-nobfd0-2.37-1.3.ppc64le",
"product_id": "libctf-nobfd0-2.37-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.ppc64le",
"product": {
"name": "libctf0-2.37-1.3.ppc64le",
"product_id": "libctf0-2.37-1.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.s390x",
"product": {
"name": "binutils-2.37-1.3.s390x",
"product_id": "binutils-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.s390x",
"product": {
"name": "binutils-devel-2.37-1.3.s390x",
"product_id": "binutils-devel-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.s390x",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.s390x",
"product_id": "binutils-devel-32bit-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.s390x",
"product": {
"name": "binutils-gold-2.37-1.3.s390x",
"product_id": "binutils-gold-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.s390x",
"product": {
"name": "libctf-nobfd0-2.37-1.3.s390x",
"product_id": "libctf-nobfd0-2.37-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.s390x",
"product": {
"name": "libctf0-2.37-1.3.s390x",
"product_id": "libctf0-2.37-1.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.37-1.3.x86_64",
"product": {
"name": "binutils-2.37-1.3.x86_64",
"product_id": "binutils-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.37-1.3.x86_64",
"product": {
"name": "binutils-devel-2.37-1.3.x86_64",
"product_id": "binutils-devel-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.37-1.3.x86_64",
"product": {
"name": "binutils-devel-32bit-2.37-1.3.x86_64",
"product_id": "binutils-devel-32bit-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.37-1.3.x86_64",
"product": {
"name": "binutils-gold-2.37-1.3.x86_64",
"product_id": "binutils-gold-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.37-1.3.x86_64",
"product": {
"name": "libctf-nobfd0-2.37-1.3.x86_64",
"product_id": "libctf-nobfd0-2.37-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libctf0-2.37-1.3.x86_64",
"product": {
"name": "libctf0-2.37-1.3.x86_64",
"product_id": "libctf0-2.37-1.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64"
},
"product_reference": "binutils-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le"
},
"product_reference": "binutils-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.s390x"
},
"product_reference": "binutils-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64"
},
"product_reference": "binutils-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64"
},
"product_reference": "binutils-devel-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le"
},
"product_reference": "binutils-devel-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x"
},
"product_reference": "binutils-devel-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64"
},
"product_reference": "binutils-devel-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64"
},
"product_reference": "binutils-devel-32bit-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64"
},
"product_reference": "binutils-gold-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le"
},
"product_reference": "binutils-gold-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x"
},
"product_reference": "binutils-gold-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64"
},
"product_reference": "binutils-gold-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64"
},
"product_reference": "libctf-nobfd0-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le"
},
"product_reference": "libctf-nobfd0-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x"
},
"product_reference": "libctf-nobfd0-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64"
},
"product_reference": "libctf-nobfd0-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64"
},
"product_reference": "libctf0-2.37-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le"
},
"product_reference": "libctf0-2.37-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x"
},
"product_reference": "libctf0-2.37-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
},
"product_reference": "libctf0-2.37-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-9939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9939"
}
],
"notes": [
{
"category": "general",
"text": "ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9939",
"url": "https://www.suse.com/security/cve/CVE-2014-9939"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2014-9939",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1105209 for CVE-2014-9939",
"url": "https://bugzilla.suse.com/1105209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2014-9939"
},
{
"cve": "CVE-2017-12448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12448"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12448",
"url": "https://www.suse.com/security/cve/CVE-2017-12448"
},
{
"category": "external",
"summary": "SUSE Bug 1052518 for CVE-2017-12448",
"url": "https://bugzilla.suse.com/1052518"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12448",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12448"
},
{
"cve": "CVE-2017-12450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12450"
}
],
"notes": [
{
"category": "general",
"text": "The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12450",
"url": "https://www.suse.com/security/cve/CVE-2017-12450"
},
{
"category": "external",
"summary": "SUSE Bug 1052514 for CVE-2017-12450",
"url": "https://bugzilla.suse.com/1052514"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12450",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12450"
},
{
"cve": "CVE-2017-12452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12452"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12452",
"url": "https://www.suse.com/security/cve/CVE-2017-12452"
},
{
"category": "external",
"summary": "SUSE Bug 1052511 for CVE-2017-12452",
"url": "https://bugzilla.suse.com/1052511"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12452",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12452"
},
{
"cve": "CVE-2017-12453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12453"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12453",
"url": "https://www.suse.com/security/cve/CVE-2017-12453"
},
{
"category": "external",
"summary": "SUSE Bug 1052509 for CVE-2017-12453",
"url": "https://bugzilla.suse.com/1052509"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12453",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12453"
},
{
"cve": "CVE-2017-12454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12454"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12454",
"url": "https://www.suse.com/security/cve/CVE-2017-12454"
},
{
"category": "external",
"summary": "SUSE Bug 1052507 for CVE-2017-12454",
"url": "https://bugzilla.suse.com/1052507"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12454",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12454"
},
{
"cve": "CVE-2017-12456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12456"
}
],
"notes": [
{
"category": "general",
"text": "The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12456",
"url": "https://www.suse.com/security/cve/CVE-2017-12456"
},
{
"category": "external",
"summary": "SUSE Bug 1052503 for CVE-2017-12456",
"url": "https://bugzilla.suse.com/1052503"
},
{
"category": "external",
"summary": "SUSE Bug 1059785 for CVE-2017-12456",
"url": "https://bugzilla.suse.com/1059785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12456"
},
{
"cve": "CVE-2017-12799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12799"
}
],
"notes": [
{
"category": "general",
"text": "The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12799",
"url": "https://www.suse.com/security/cve/CVE-2017-12799"
},
{
"category": "external",
"summary": "SUSE Bug 1053347 for CVE-2017-12799",
"url": "https://bugzilla.suse.com/1053347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12799"
},
{
"cve": "CVE-2017-13757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13757"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13757",
"url": "https://www.suse.com/security/cve/CVE-2017-13757"
},
{
"category": "external",
"summary": "SUSE Bug 1056312 for CVE-2017-13757",
"url": "https://bugzilla.suse.com/1056312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-13757"
},
{
"cve": "CVE-2017-14128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14128"
}
],
"notes": [
{
"category": "general",
"text": "The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14128",
"url": "https://www.suse.com/security/cve/CVE-2017-14128"
},
{
"category": "external",
"summary": "SUSE Bug 1057139 for CVE-2017-14128",
"url": "https://bugzilla.suse.com/1057139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14128"
},
{
"cve": "CVE-2017-14129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14129"
}
],
"notes": [
{
"category": "general",
"text": "The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14129",
"url": "https://www.suse.com/security/cve/CVE-2017-14129"
},
{
"category": "external",
"summary": "SUSE Bug 1057144 for CVE-2017-14129",
"url": "https://bugzilla.suse.com/1057144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14129"
},
{
"cve": "CVE-2017-14130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14130"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14130",
"url": "https://www.suse.com/security/cve/CVE-2017-14130"
},
{
"category": "external",
"summary": "SUSE Bug 1057149 for CVE-2017-14130",
"url": "https://bugzilla.suse.com/1057149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14130"
},
{
"cve": "CVE-2017-14333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14333"
}
],
"notes": [
{
"category": "general",
"text": "The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during \"readelf -a\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14333",
"url": "https://www.suse.com/security/cve/CVE-2017-14333"
},
{
"category": "external",
"summary": "SUSE Bug 1058480 for CVE-2017-14333",
"url": "https://bugzilla.suse.com/1058480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-14333"
},
{
"cve": "CVE-2017-14529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14529"
}
],
"notes": [
{
"category": "general",
"text": "The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14529",
"url": "https://www.suse.com/security/cve/CVE-2017-14529"
},
{
"category": "external",
"summary": "SUSE Bug 1059050 for CVE-2017-14529",
"url": "https://bugzilla.suse.com/1059050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14529"
},
{
"cve": "CVE-2017-14729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14729"
}
],
"notes": [
{
"category": "general",
"text": "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14729",
"url": "https://www.suse.com/security/cve/CVE-2017-14729"
},
{
"category": "external",
"summary": "SUSE Bug 1060621 for CVE-2017-14729",
"url": "https://bugzilla.suse.com/1060621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-14729"
},
{
"cve": "CVE-2017-14745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14745"
}
],
"notes": [
{
"category": "general",
"text": "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14745",
"url": "https://www.suse.com/security/cve/CVE-2017-14745"
},
{
"category": "external",
"summary": "SUSE Bug 1060599 for CVE-2017-14745",
"url": "https://bugzilla.suse.com/1060599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-14745"
},
{
"cve": "CVE-2017-14974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14974"
}
],
"notes": [
{
"category": "general",
"text": "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14974",
"url": "https://www.suse.com/security/cve/CVE-2017-14974"
},
{
"category": "external",
"summary": "SUSE Bug 1061241 for CVE-2017-14974",
"url": "https://bugzilla.suse.com/1061241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14974"
},
{
"cve": "CVE-2017-15938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15938"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15938",
"url": "https://www.suse.com/security/cve/CVE-2017-15938"
},
{
"category": "external",
"summary": "SUSE Bug 1065693 for CVE-2017-15938",
"url": "https://bugzilla.suse.com/1065693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-15938"
},
{
"cve": "CVE-2017-15939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15939"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15939",
"url": "https://www.suse.com/security/cve/CVE-2017-15939"
},
{
"category": "external",
"summary": "SUSE Bug 1061623 for CVE-2017-15939",
"url": "https://bugzilla.suse.com/1061623"
},
{
"category": "external",
"summary": "SUSE Bug 1065689 for CVE-2017-15939",
"url": "https://bugzilla.suse.com/1065689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15939"
},
{
"cve": "CVE-2017-15996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15996"
}
],
"notes": [
{
"category": "general",
"text": "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15996",
"url": "https://www.suse.com/security/cve/CVE-2017-15996"
},
{
"category": "external",
"summary": "SUSE Bug 1065643 for CVE-2017-15996",
"url": "https://bugzilla.suse.com/1065643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15996"
},
{
"cve": "CVE-2017-16826",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16826"
}
],
"notes": [
{
"category": "general",
"text": "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16826",
"url": "https://www.suse.com/security/cve/CVE-2017-16826"
},
{
"category": "external",
"summary": "SUSE Bug 1068640 for CVE-2017-16826",
"url": "https://bugzilla.suse.com/1068640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16826"
},
{
"cve": "CVE-2017-16827",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16827"
}
],
"notes": [
{
"category": "general",
"text": "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16827",
"url": "https://www.suse.com/security/cve/CVE-2017-16827"
},
{
"category": "external",
"summary": "SUSE Bug 1069202 for CVE-2017-16827",
"url": "https://bugzilla.suse.com/1069202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16827"
},
{
"cve": "CVE-2017-16828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16828"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16828",
"url": "https://www.suse.com/security/cve/CVE-2017-16828"
},
{
"category": "external",
"summary": "SUSE Bug 1069176 for CVE-2017-16828",
"url": "https://bugzilla.suse.com/1069176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-16828"
},
{
"cve": "CVE-2017-16829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16829"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16829",
"url": "https://www.suse.com/security/cve/CVE-2017-16829"
},
{
"category": "external",
"summary": "SUSE Bug 1068950 for CVE-2017-16829",
"url": "https://bugzilla.suse.com/1068950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16829"
},
{
"cve": "CVE-2017-16830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16830"
}
],
"notes": [
{
"category": "general",
"text": "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16830",
"url": "https://www.suse.com/security/cve/CVE-2017-16830"
},
{
"category": "external",
"summary": "SUSE Bug 1068888 for CVE-2017-16830",
"url": "https://bugzilla.suse.com/1068888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-16830"
},
{
"cve": "CVE-2017-16831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16831"
}
],
"notes": [
{
"category": "general",
"text": "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16831",
"url": "https://www.suse.com/security/cve/CVE-2017-16831"
},
{
"category": "external",
"summary": "SUSE Bug 1068887 for CVE-2017-16831",
"url": "https://bugzilla.suse.com/1068887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16831"
},
{
"cve": "CVE-2017-16832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16832"
}
],
"notes": [
{
"category": "general",
"text": "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16832",
"url": "https://www.suse.com/security/cve/CVE-2017-16832"
},
{
"category": "external",
"summary": "SUSE Bug 1068643 for CVE-2017-16832",
"url": "https://bugzilla.suse.com/1068643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-16832"
},
{
"cve": "CVE-2017-6965",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6965"
}
],
"notes": [
{
"category": "general",
"text": "readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6965",
"url": "https://www.suse.com/security/cve/CVE-2017-6965"
},
{
"category": "external",
"summary": "SUSE Bug 1029909 for CVE-2017-6965",
"url": "https://bugzilla.suse.com/1029909"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-6965",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-6965",
"url": "https://bugzilla.suse.com/1030296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-6965"
},
{
"cve": "CVE-2017-6966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6966"
}
],
"notes": [
{
"category": "general",
"text": "readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6966",
"url": "https://www.suse.com/security/cve/CVE-2017-6966"
},
{
"category": "external",
"summary": "SUSE Bug 1029908 for CVE-2017-6966",
"url": "https://bugzilla.suse.com/1029908"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-6966",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-6966",
"url": "https://bugzilla.suse.com/1030296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-6966"
},
{
"cve": "CVE-2017-6969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6969"
}
],
"notes": [
{
"category": "general",
"text": "readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6969",
"url": "https://www.suse.com/security/cve/CVE-2017-6969"
},
{
"category": "external",
"summary": "SUSE Bug 1029907 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1029907"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1105209 for CVE-2017-6969",
"url": "https://bugzilla.suse.com/1105209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-6969"
},
{
"cve": "CVE-2017-7209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7209"
}
],
"notes": [
{
"category": "general",
"text": "The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7209",
"url": "https://www.suse.com/security/cve/CVE-2017-7209"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7209",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7209",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030298 for CVE-2017-7209",
"url": "https://bugzilla.suse.com/1030298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7209"
},
{
"cve": "CVE-2017-7210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7210"
}
],
"notes": [
{
"category": "general",
"text": "objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7210",
"url": "https://www.suse.com/security/cve/CVE-2017-7210"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7210",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7210",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030297 for CVE-2017-7210",
"url": "https://bugzilla.suse.com/1030297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7210"
},
{
"cve": "CVE-2017-7223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7223"
}
],
"notes": [
{
"category": "general",
"text": "GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7223",
"url": "https://www.suse.com/security/cve/CVE-2017-7223"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7223",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7223",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030589 for CVE-2017-7223",
"url": "https://bugzilla.suse.com/1030589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7223"
},
{
"cve": "CVE-2017-7224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7224"
}
],
"notes": [
{
"category": "general",
"text": "The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7224",
"url": "https://www.suse.com/security/cve/CVE-2017-7224"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7224",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7224",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030588 for CVE-2017-7224",
"url": "https://bugzilla.suse.com/1030588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7224"
},
{
"cve": "CVE-2017-7225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7225"
}
],
"notes": [
{
"category": "general",
"text": "The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7225",
"url": "https://www.suse.com/security/cve/CVE-2017-7225"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7225",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7225",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030585 for CVE-2017-7225",
"url": "https://bugzilla.suse.com/1030585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7225"
},
{
"cve": "CVE-2017-7226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7226"
}
],
"notes": [
{
"category": "general",
"text": "The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7226",
"url": "https://www.suse.com/security/cve/CVE-2017-7226"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1030584 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1030584"
},
{
"category": "external",
"summary": "SUSE Bug 1105209 for CVE-2017-7226",
"url": "https://bugzilla.suse.com/1105209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-7226"
},
{
"cve": "CVE-2017-7299",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7299"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7299",
"url": "https://www.suse.com/security/cve/CVE-2017-7299"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7299",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031644 for CVE-2017-7299",
"url": "https://bugzilla.suse.com/1031644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7299"
},
{
"cve": "CVE-2017-7300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7300"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7300",
"url": "https://www.suse.com/security/cve/CVE-2017-7300"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7300",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031656 for CVE-2017-7300",
"url": "https://bugzilla.suse.com/1031656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-7300"
},
{
"cve": "CVE-2017-7301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7301"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7301",
"url": "https://www.suse.com/security/cve/CVE-2017-7301"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7301",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031638 for CVE-2017-7301",
"url": "https://bugzilla.suse.com/1031638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7301"
},
{
"cve": "CVE-2017-7302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7302"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7302",
"url": "https://www.suse.com/security/cve/CVE-2017-7302"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7302",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031595 for CVE-2017-7302",
"url": "https://bugzilla.suse.com/1031595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7302"
},
{
"cve": "CVE-2017-7303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7303"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7303",
"url": "https://www.suse.com/security/cve/CVE-2017-7303"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7303",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031593 for CVE-2017-7303",
"url": "https://bugzilla.suse.com/1031593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7303"
},
{
"cve": "CVE-2017-7304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7304"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7304",
"url": "https://www.suse.com/security/cve/CVE-2017-7304"
},
{
"category": "external",
"summary": "SUSE Bug 1030295 for CVE-2017-7304",
"url": "https://bugzilla.suse.com/1030295"
},
{
"category": "external",
"summary": "SUSE Bug 1031590 for CVE-2017-7304",
"url": "https://bugzilla.suse.com/1031590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7304"
},
{
"cve": "CVE-2017-8392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8392"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8392",
"url": "https://www.suse.com/security/cve/CVE-2017-8392"
},
{
"category": "external",
"summary": "SUSE Bug 1037052 for CVE-2017-8392",
"url": "https://bugzilla.suse.com/1037052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8392"
},
{
"cve": "CVE-2017-8393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8393"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8393",
"url": "https://www.suse.com/security/cve/CVE-2017-8393"
},
{
"category": "external",
"summary": "SUSE Bug 1037057 for CVE-2017-8393",
"url": "https://bugzilla.suse.com/1037057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8393"
},
{
"cve": "CVE-2017-8394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8394"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8394",
"url": "https://www.suse.com/security/cve/CVE-2017-8394"
},
{
"category": "external",
"summary": "SUSE Bug 1037061 for CVE-2017-8394",
"url": "https://bugzilla.suse.com/1037061"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8394"
},
{
"cve": "CVE-2017-8396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8396"
}
],
"notes": [
{
"category": "general",
"text": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn\u0027t catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8396",
"url": "https://www.suse.com/security/cve/CVE-2017-8396"
},
{
"category": "external",
"summary": "SUSE Bug 1037066 for CVE-2017-8396",
"url": "https://bugzilla.suse.com/1037066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8396"
},
{
"cve": "CVE-2017-8421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8421"
}
],
"notes": [
{
"category": "general",
"text": "The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8421",
"url": "https://www.suse.com/security/cve/CVE-2017-8421"
},
{
"category": "external",
"summary": "SUSE Bug 1037273 for CVE-2017-8421",
"url": "https://bugzilla.suse.com/1037273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8421"
},
{
"cve": "CVE-2017-9746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9746"
}
],
"notes": [
{
"category": "general",
"text": "The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9746",
"url": "https://www.suse.com/security/cve/CVE-2017-9746"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9746",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044891 for CVE-2017-9746",
"url": "https://bugzilla.suse.com/1044891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9746"
},
{
"cve": "CVE-2017-9747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9747"
}
],
"notes": [
{
"category": "general",
"text": "The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9747",
"url": "https://www.suse.com/security/cve/CVE-2017-9747"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9747",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044897 for CVE-2017-9747",
"url": "https://bugzilla.suse.com/1044897"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9747"
},
{
"cve": "CVE-2017-9748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9748"
}
],
"notes": [
{
"category": "general",
"text": "The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9748",
"url": "https://www.suse.com/security/cve/CVE-2017-9748"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9748",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044901 for CVE-2017-9748",
"url": "https://bugzilla.suse.com/1044901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9748"
},
{
"cve": "CVE-2017-9750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9750"
}
],
"notes": [
{
"category": "general",
"text": "opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9750",
"url": "https://www.suse.com/security/cve/CVE-2017-9750"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9750",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044909 for CVE-2017-9750",
"url": "https://bugzilla.suse.com/1044909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9750"
},
{
"cve": "CVE-2017-9755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9755"
}
],
"notes": [
{
"category": "general",
"text": "opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9755",
"url": "https://www.suse.com/security/cve/CVE-2017-9755"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9755",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044925 for CVE-2017-9755",
"url": "https://bugzilla.suse.com/1044925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-9755"
},
{
"cve": "CVE-2017-9756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9756"
}
],
"notes": [
{
"category": "general",
"text": "The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9756",
"url": "https://www.suse.com/security/cve/CVE-2017-9756"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9756",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1044927 for CVE-2017-9756",
"url": "https://bugzilla.suse.com/1044927"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9756"
},
{
"cve": "CVE-2018-1000876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000876"
}
],
"notes": [
{
"category": "general",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000876",
"url": "https://www.suse.com/security/cve/CVE-2018-1000876"
},
{
"category": "external",
"summary": "SUSE Bug 1120640 for CVE-2018-1000876",
"url": "https://bugzilla.suse.com/1120640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-10372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10372"
}
],
"notes": [
{
"category": "general",
"text": "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10372",
"url": "https://www.suse.com/security/cve/CVE-2018-10372"
},
{
"category": "external",
"summary": "SUSE Bug 1091015 for CVE-2018-10372",
"url": "https://bugzilla.suse.com/1091015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10372"
},
{
"cve": "CVE-2018-10373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10373"
}
],
"notes": [
{
"category": "general",
"text": "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10373",
"url": "https://www.suse.com/security/cve/CVE-2018-10373"
},
{
"category": "external",
"summary": "SUSE Bug 1090997 for CVE-2018-10373",
"url": "https://bugzilla.suse.com/1090997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10373"
},
{
"cve": "CVE-2018-10534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10534"
}
],
"notes": [
{
"category": "general",
"text": "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10534",
"url": "https://www.suse.com/security/cve/CVE-2018-10534"
},
{
"category": "external",
"summary": "SUSE Bug 1091368 for CVE-2018-10534",
"url": "https://bugzilla.suse.com/1091368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10534"
},
{
"cve": "CVE-2018-10535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10535"
}
],
"notes": [
{
"category": "general",
"text": "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10535",
"url": "https://www.suse.com/security/cve/CVE-2018-10535"
},
{
"category": "external",
"summary": "SUSE Bug 1091365 for CVE-2018-10535",
"url": "https://bugzilla.suse.com/1091365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-10535"
},
{
"cve": "CVE-2018-17358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17358",
"url": "https://www.suse.com/security/cve/CVE-2018-17358"
},
{
"category": "external",
"summary": "SUSE Bug 1109412 for CVE-2018-17358",
"url": "https://bugzilla.suse.com/1109412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-17358"
},
{
"cve": "CVE-2018-17359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17359",
"url": "https://www.suse.com/security/cve/CVE-2018-17359"
},
{
"category": "external",
"summary": "SUSE Bug 1109413 for CVE-2018-17359",
"url": "https://bugzilla.suse.com/1109413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-17359"
},
{
"cve": "CVE-2018-17360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17360",
"url": "https://www.suse.com/security/cve/CVE-2018-17360"
},
{
"category": "external",
"summary": "SUSE Bug 1109414 for CVE-2018-17360",
"url": "https://bugzilla.suse.com/1109414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-17360"
},
{
"cve": "CVE-2018-17985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17985"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many \u0027P\u0027 characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17985",
"url": "https://www.suse.com/security/cve/CVE-2018-17985"
},
{
"category": "external",
"summary": "SUSE Bug 1116827 for CVE-2018-17985",
"url": "https://bugzilla.suse.com/1116827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-17985"
},
{
"cve": "CVE-2018-18309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18309"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18309",
"url": "https://www.suse.com/security/cve/CVE-2018-18309"
},
{
"category": "external",
"summary": "SUSE Bug 1111996 for CVE-2018-18309",
"url": "https://bugzilla.suse.com/1111996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-18309"
},
{
"cve": "CVE-2018-18483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18483"
}
],
"notes": [
{
"category": "general",
"text": "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18483",
"url": "https://www.suse.com/security/cve/CVE-2018-18483"
},
{
"category": "external",
"summary": "SUSE Bug 1112535 for CVE-2018-18483",
"url": "https://bugzilla.suse.com/1112535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18483"
},
{
"cve": "CVE-2018-18484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18484",
"url": "https://www.suse.com/security/cve/CVE-2018-18484"
},
{
"category": "external",
"summary": "SUSE Bug 1112534 for CVE-2018-18484",
"url": "https://bugzilla.suse.com/1112534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18484"
},
{
"cve": "CVE-2018-18605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18605"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18605",
"url": "https://www.suse.com/security/cve/CVE-2018-18605"
},
{
"category": "external",
"summary": "SUSE Bug 1113255 for CVE-2018-18605",
"url": "https://bugzilla.suse.com/1113255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18605"
},
{
"cve": "CVE-2018-18606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18606"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18606",
"url": "https://www.suse.com/security/cve/CVE-2018-18606"
},
{
"category": "external",
"summary": "SUSE Bug 1113252 for CVE-2018-18606",
"url": "https://bugzilla.suse.com/1113252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-18606"
},
{
"cve": "CVE-2018-18607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18607"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18607",
"url": "https://www.suse.com/security/cve/CVE-2018-18607"
},
{
"category": "external",
"summary": "SUSE Bug 1113247 for CVE-2018-18607",
"url": "https://bugzilla.suse.com/1113247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-18607"
},
{
"cve": "CVE-2018-19931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19931"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19931",
"url": "https://www.suse.com/security/cve/CVE-2018-19931"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19931",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-19931"
},
{
"cve": "CVE-2018-19932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19932"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19932",
"url": "https://www.suse.com/security/cve/CVE-2018-19932"
},
{
"category": "external",
"summary": "SUSE Bug 1118830 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118830"
},
{
"category": "external",
"summary": "SUSE Bug 1118831 for CVE-2018-19932",
"url": "https://bugzilla.suse.com/1118831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-19932"
},
{
"cve": "CVE-2018-20623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20623"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20623",
"url": "https://www.suse.com/security/cve/CVE-2018-20623"
},
{
"category": "external",
"summary": "SUSE Bug 1121035 for CVE-2018-20623",
"url": "https://bugzilla.suse.com/1121035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20623"
},
{
"cve": "CVE-2018-20651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20651"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20651",
"url": "https://www.suse.com/security/cve/CVE-2018-20651"
},
{
"category": "external",
"summary": "SUSE Bug 1121034 for CVE-2018-20651",
"url": "https://bugzilla.suse.com/1121034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20651"
},
{
"cve": "CVE-2018-20671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20671"
}
],
"notes": [
{
"category": "general",
"text": "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20671",
"url": "https://www.suse.com/security/cve/CVE-2018-20671"
},
{
"category": "external",
"summary": "SUSE Bug 1121056 for CVE-2018-20671",
"url": "https://bugzilla.suse.com/1121056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20671"
},
{
"cve": "CVE-2018-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6323"
}
],
"notes": [
{
"category": "general",
"text": "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6323",
"url": "https://www.suse.com/security/cve/CVE-2018-6323"
},
{
"category": "external",
"summary": "SUSE Bug 1077745 for CVE-2018-6323",
"url": "https://bugzilla.suse.com/1077745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-6323"
},
{
"cve": "CVE-2018-6543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6543"
}
],
"notes": [
{
"category": "general",
"text": "In GNU Binutils 2.30, there\u0027s an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6543",
"url": "https://www.suse.com/security/cve/CVE-2018-6543"
},
{
"category": "external",
"summary": "SUSE Bug 1079103 for CVE-2018-6543",
"url": "https://bugzilla.suse.com/1079103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6543"
},
{
"cve": "CVE-2018-6759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6759"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6759",
"url": "https://www.suse.com/security/cve/CVE-2018-6759"
},
{
"category": "external",
"summary": "SUSE Bug 1079741 for CVE-2018-6759",
"url": "https://bugzilla.suse.com/1079741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6759"
},
{
"cve": "CVE-2018-6872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6872"
}
],
"notes": [
{
"category": "general",
"text": "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6872",
"url": "https://www.suse.com/security/cve/CVE-2018-6872"
},
{
"category": "external",
"summary": "SUSE Bug 1080556 for CVE-2018-6872",
"url": "https://bugzilla.suse.com/1080556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6872"
},
{
"cve": "CVE-2018-7208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7208"
}
],
"notes": [
{
"category": "general",
"text": "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7208",
"url": "https://www.suse.com/security/cve/CVE-2018-7208"
},
{
"category": "external",
"summary": "SUSE Bug 1081527 for CVE-2018-7208",
"url": "https://bugzilla.suse.com/1081527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7208"
},
{
"cve": "CVE-2018-7568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7568"
}
],
"notes": [
{
"category": "general",
"text": "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7568",
"url": "https://www.suse.com/security/cve/CVE-2018-7568"
},
{
"category": "external",
"summary": "SUSE Bug 1086788 for CVE-2018-7568",
"url": "https://bugzilla.suse.com/1086788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7568"
},
{
"cve": "CVE-2018-7569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7569"
}
],
"notes": [
{
"category": "general",
"text": "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7569",
"url": "https://www.suse.com/security/cve/CVE-2018-7569"
},
{
"category": "external",
"summary": "SUSE Bug 1083532 for CVE-2018-7569",
"url": "https://bugzilla.suse.com/1083532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7569"
},
{
"cve": "CVE-2018-7570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7570"
}
],
"notes": [
{
"category": "general",
"text": "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7570",
"url": "https://www.suse.com/security/cve/CVE-2018-7570"
},
{
"category": "external",
"summary": "SUSE Bug 1083528 for CVE-2018-7570",
"url": "https://bugzilla.suse.com/1083528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7570"
},
{
"cve": "CVE-2018-7642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7642"
}
],
"notes": [
{
"category": "general",
"text": "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7642",
"url": "https://www.suse.com/security/cve/CVE-2018-7642"
},
{
"category": "external",
"summary": "SUSE Bug 1086786 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1086786"
},
{
"category": "external",
"summary": "SUSE Bug 1128518 for CVE-2018-7642",
"url": "https://bugzilla.suse.com/1128518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-7642"
},
{
"cve": "CVE-2018-7643",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7643"
}
],
"notes": [
{
"category": "general",
"text": "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7643",
"url": "https://www.suse.com/security/cve/CVE-2018-7643"
},
{
"category": "external",
"summary": "SUSE Bug 1086784 for CVE-2018-7643",
"url": "https://bugzilla.suse.com/1086784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-7643"
},
{
"cve": "CVE-2018-8945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8945"
}
],
"notes": [
{
"category": "general",
"text": "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8945",
"url": "https://www.suse.com/security/cve/CVE-2018-8945"
},
{
"category": "external",
"summary": "SUSE Bug 1086608 for CVE-2018-8945",
"url": "https://bugzilla.suse.com/1086608"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8945"
},
{
"cve": "CVE-2019-1010180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1010180"
}
],
"notes": [
{
"category": "general",
"text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1010180",
"url": "https://www.suse.com/security/cve/CVE-2019-1010180"
},
{
"category": "external",
"summary": "SUSE Bug 1142772 for CVE-2019-1010180",
"url": "https://bugzilla.suse.com/1142772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-1010180"
},
{
"cve": "CVE-2019-12972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12972",
"url": "https://www.suse.com/security/cve/CVE-2019-12972"
},
{
"category": "external",
"summary": "SUSE Bug 1140126 for CVE-2019-12972",
"url": "https://bugzilla.suse.com/1140126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-12972"
},
{
"cve": "CVE-2019-14250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14250"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14250",
"url": "https://www.suse.com/security/cve/CVE-2019-14250"
},
{
"category": "external",
"summary": "SUSE Bug 1142649 for CVE-2019-14250",
"url": "https://bugzilla.suse.com/1142649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14250"
},
{
"cve": "CVE-2019-14444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14444"
}
],
"notes": [
{
"category": "general",
"text": "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14444",
"url": "https://www.suse.com/security/cve/CVE-2019-14444"
},
{
"category": "external",
"summary": "SUSE Bug 1143609 for CVE-2019-14444",
"url": "https://bugzilla.suse.com/1143609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14444"
},
{
"cve": "CVE-2019-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17450"
}
],
"notes": [
{
"category": "general",
"text": "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17450",
"url": "https://www.suse.com/security/cve/CVE-2019-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1153770 for CVE-2019-17450",
"url": "https://bugzilla.suse.com/1153770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-17450"
},
{
"cve": "CVE-2019-17451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17451"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17451",
"url": "https://www.suse.com/security/cve/CVE-2019-17451"
},
{
"category": "external",
"summary": "SUSE Bug 1153768 for CVE-2019-17451",
"url": "https://bugzilla.suse.com/1153768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-17451"
},
{
"cve": "CVE-2019-9074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9074"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9074",
"url": "https://www.suse.com/security/cve/CVE-2019-9074"
},
{
"category": "external",
"summary": "SUSE Bug 1126831 for CVE-2019-9074",
"url": "https://bugzilla.suse.com/1126831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9074"
},
{
"cve": "CVE-2019-9075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9075"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9075",
"url": "https://www.suse.com/security/cve/CVE-2019-9075"
},
{
"category": "external",
"summary": "SUSE Bug 1071544 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1071544"
},
{
"category": "external",
"summary": "SUSE Bug 1126829 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "external",
"summary": "SUSE Bug 1193110 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1193110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9075"
},
{
"cve": "CVE-2019-9077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9077"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9077",
"url": "https://www.suse.com/security/cve/CVE-2019-9077"
},
{
"category": "external",
"summary": "SUSE Bug 1126826 for CVE-2019-9077",
"url": "https://bugzilla.suse.com/1126826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9077"
},
{
"cve": "CVE-2020-16590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16590"
}
],
"notes": [
{
"category": "general",
"text": "A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16590",
"url": "https://www.suse.com/security/cve/CVE-2020-16590"
},
{
"category": "external",
"summary": "SUSE Bug 1179898 for CVE-2020-16590",
"url": "https://bugzilla.suse.com/1179898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-16590"
},
{
"cve": "CVE-2020-16591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16591"
}
],
"notes": [
{
"category": "general",
"text": "A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16591",
"url": "https://www.suse.com/security/cve/CVE-2020-16591"
},
{
"category": "external",
"summary": "SUSE Bug 1179899 for CVE-2020-16591",
"url": "https://bugzilla.suse.com/1179899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16591"
},
{
"cve": "CVE-2020-16592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16592"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16592",
"url": "https://www.suse.com/security/cve/CVE-2020-16592"
},
{
"category": "external",
"summary": "SUSE Bug 1179900 for CVE-2020-16592",
"url": "https://bugzilla.suse.com/1179900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16592"
},
{
"cve": "CVE-2020-16593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16593"
}
],
"notes": [
{
"category": "general",
"text": "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16593",
"url": "https://www.suse.com/security/cve/CVE-2020-16593"
},
{
"category": "external",
"summary": "SUSE Bug 1179901 for CVE-2020-16593",
"url": "https://bugzilla.suse.com/1179901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16593"
},
{
"cve": "CVE-2020-16598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16598"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16598",
"url": "https://www.suse.com/security/cve/CVE-2020-16598"
},
{
"category": "external",
"summary": "SUSE Bug 1179902 for CVE-2020-16598",
"url": "https://bugzilla.suse.com/1179902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16598"
},
{
"cve": "CVE-2020-16599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16599"
}
],
"notes": [
{
"category": "general",
"text": "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16599",
"url": "https://www.suse.com/security/cve/CVE-2020-16599"
},
{
"category": "external",
"summary": "SUSE Bug 1179903 for CVE-2020-16599",
"url": "https://bugzilla.suse.com/1179903"
},
{
"category": "external",
"summary": "SUSE Bug 1206080 for CVE-2020-16599",
"url": "https://bugzilla.suse.com/1206080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-16599"
},
{
"cve": "CVE-2020-35448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35448"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35448",
"url": "https://www.suse.com/security/cve/CVE-2020-35448"
},
{
"category": "external",
"summary": "SUSE Bug 1184794 for CVE-2020-35448",
"url": "https://bugzilla.suse.com/1184794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35448"
},
{
"cve": "CVE-2020-35493",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35493"
}
],
"notes": [
{
"category": "general",
"text": "A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -\u003e out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35493",
"url": "https://www.suse.com/security/cve/CVE-2020-35493"
},
{
"category": "external",
"summary": "SUSE Bug 1180451 for CVE-2020-35493",
"url": "https://bugzilla.suse.com/1180451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35493"
},
{
"cve": "CVE-2020-35496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35496"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35496",
"url": "https://www.suse.com/security/cve/CVE-2020-35496"
},
{
"category": "external",
"summary": "SUSE Bug 1180454 for CVE-2020-35496",
"url": "https://bugzilla.suse.com/1180454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35496"
},
{
"cve": "CVE-2020-35507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35507"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35507",
"url": "https://www.suse.com/security/cve/CVE-2020-35507"
},
{
"category": "external",
"summary": "SUSE Bug 1180461 for CVE-2020-35507",
"url": "https://bugzilla.suse.com/1180461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-35507"
},
{
"cve": "CVE-2021-20197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20197"
}
],
"notes": [
{
"category": "general",
"text": "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20197",
"url": "https://www.suse.com/security/cve/CVE-2021-20197"
},
{
"category": "external",
"summary": "SUSE Bug 1181452 for CVE-2021-20197",
"url": "https://bugzilla.suse.com/1181452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20197"
},
{
"cve": "CVE-2021-20284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20284"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20284",
"url": "https://www.suse.com/security/cve/CVE-2021-20284"
},
{
"category": "external",
"summary": "SUSE Bug 1183511 for CVE-2021-20284",
"url": "https://bugzilla.suse.com/1183511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20284"
},
{
"cve": "CVE-2021-3487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3487"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3487",
"url": "https://www.suse.com/security/cve/CVE-2021-3487"
},
{
"category": "external",
"summary": "SUSE Bug 1184620 for CVE-2021-3487",
"url": "https://bugzilla.suse.com/1184620"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:binutils-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x",
"openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64",
"openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le",
"openSUSE Tumbleweed:libctf0-2.37-1.3.s390x",
"openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3487"
}
]
}
SUSE-SU-2020:3060-1
Vulnerability from csaf_suse - Published: 2020-10-28 07:09 - Updated: 2020-10-28 07:09Summary
Security update for binutils
Severity
Moderate
Notes
Title of the patch: Security update for binutils
Description of the patch: This update for binutils fixes the following issues:
binutils was updated to version 2.35. (jsc#ECO-2373)
Update to binutils 2.35:
* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.
The old behaviour - of displaying as many characters as possible, up to
the 80 column limit - can be restored by the use of the --silent-truncation
option.
* The linker can now produce a dependency file listing the inputs that it
has processed, much like the -M -MP option supported by the compiler.
- fix DT_NEEDED order with -flto [bsc#1163744]
Update to binutils 2.34:
* The disassembler (objdump --disassemble) now has an option to
generate ascii art thats show the arcs between that start and end
points of control flow instructions.
* The binutils tools now have support for debuginfod. Debuginfod is a
HTTP service for distributing ELF/DWARF debugging information as
well as source code. The tools can now connect to debuginfod
servers in order to download debug information about the files that
they are processing.
* The assembler and linker now support the generation of ELF format
files for the Z80 architecture.
- Add new subpackages for libctf and libctf-nobfd.
- Disable LTO due to bsc#1163333.
- Includes fixes for these CVEs:
bsc#1153768 aka CVE-2019-17451 aka PR25070
bsc#1153770 aka CVE-2019-17450 aka PR25078
- fix various build fails on aarch64 (PR25210, bsc#1157755).
Update to binutils 2.33.1:
* Adds support for the Arm Scalable Vector Extension version 2
(SVE2) instructions, the Arm Transactional Memory Extension (TME)
instructions and the Armv8.1-M Mainline and M-profile Vector
Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes|no]
configure time option to set the default behavior. Set the default
if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
which workaround to use. The option --fix-cortex-a53-843419 now
takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
which can be used to force a particular workaround to be used.
See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties
in the AArch64 ELF linker.
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI
on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=<txt>] option to objdump which if present,
provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment <section-name>=<power-of-2-align>
option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
and --debug-dump=follow) and objdump (--dwarf=links and
--dwarf=follow-links) will now display and/or follow multiple
links if more than one are present in a file. (This usually
happens when gcc's -gsplit-dwarf option is used).
In addition objdump's --dwarf=follow-links now also affects its
other display options, so that for example, when combined with
--syms it will cause the symbol tables in any linked debug info
files to also be displayed. In addition when combined with
--disassemble the --dwarf= follow-links option will ensure that
any symbol tables in the linked files are read and used when
disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
to objdump and readelf.
- Includes fixes for these CVEs:
bsc#1126826 aka CVE-2019-9077 aka PR1126826
bsc#1126829 aka CVE-2019-9075 aka PR1126829
bsc#1126831 aka CVE-2019-9074 aka PR24235
bsc#1140126 aka CVE-2019-12972 aka PR23405
bsc#1143609 aka CVE-2019-14444 aka PR24829
bsc#1142649 aka CVE-2019-14250 aka PR90924
* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.
Patchnames: SUSE-2020-3060,SUSE-SLE-Module-Basesystem-15-SP1-2020-3060,SUSE-SLE-Module-Basesystem-15-SP2-2020-3060,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3060,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3060,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3060,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3060
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4 (Medium)
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.2 (Medium)
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
42 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
References
43 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for binutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for binutils fixes the following issues:\n\nbinutils was updated to version 2.35. (jsc#ECO-2373)\n\nUpdate to binutils 2.35:\n\n* The assembler can now produce DWARF-5 format line number tables.\n* Readelf now has a \u0027lint\u0027 mode to enable extra checks of the files it is processing.\n* Readelf will now display \u0027[...]\u0027 when it has to truncate a symbol name. \n The old behaviour - of displaying as many characters as possible, up to\n the 80 column limit - can be restored by the use of the --silent-truncation\n option.\n* The linker can now produce a dependency file listing the inputs that it\n has processed, much like the -M -MP option supported by the compiler.\n\n- fix DT_NEEDED order with -flto [bsc#1163744]\n\n\nUpdate to binutils 2.34:\n\n* The disassembler (objdump --disassemble) now has an option to\n generate ascii art thats show the arcs between that start and end\n points of control flow instructions.\n* The binutils tools now have support for debuginfod. Debuginfod is a \n HTTP service for distributing ELF/DWARF debugging information as\n well as source code. The tools can now connect to debuginfod\n servers in order to download debug information about the files that\n they are processing.\n* The assembler and linker now support the generation of ELF format\n files for the Z80 architecture.\n\n- Add new subpackages for libctf and libctf-nobfd.\n- Disable LTO due to bsc#1163333.\n- Includes fixes for these CVEs:\n bsc#1153768 aka CVE-2019-17451 aka PR25070\n bsc#1153770 aka CVE-2019-17450 aka PR25078\n\n- fix various build fails on aarch64 (PR25210, bsc#1157755).\n\nUpdate to binutils 2.33.1:\n\n* Adds support for the Arm Scalable Vector Extension version 2\n (SVE2) instructions, the Arm Transactional Memory Extension (TME)\n instructions and the Armv8.1-M Mainline and M-profile Vector\n Extension (MVE) instructions.\n* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P\n processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,\n Cortex-A76AE, and Cortex-A77 processors.\n* Adds a .float16 directive for both Arm and AArch64 to allow\n encoding of 16-bit floating point literals.\n* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)\n Loongson3 LLSC Errata. Add a --enable-mips-fix-loongson3-llsc=[yes|no]\n configure time option to set the default behavior. Set the default\n if the configure option is not used to \u0027no\u0027.\n* The Cortex-A53 Erratum 843419 workaround now supports a choice of\n which workaround to use. The option --fix-cortex-a53-843419 now\n takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]\n which can be used to force a particular workaround to be used.\n See --help for AArch64 for more details.\n* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and\n GNU_PROPERTY_AARCH64_FEATURE_1_PAC in ELF GNU program properties\n in the AArch64 ELF linker. \n* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI\n on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI \n on inputs and use PLTs protected with BTI.\n* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.\n* Add --source-comment[=\u003ctxt\u003e] option to objdump which if present,\n provides a prefix to source code lines displayed in a disassembly.\n* Add --set-section-alignment \u003csection-name\u003e=\u003cpower-of-2-align\u003e\n option to objcopy to allow the changing of section alignments.\n* Add --verilog-data-width option to objcopy for verilog targets to\n control width of data elements in verilog hex format.\n* The separate debug info file options of readelf (--debug-dump=links\n and --debug-dump=follow) and objdump (--dwarf=links and\n --dwarf=follow-links) will now display and/or follow multiple\n links if more than one are present in a file. (This usually\n happens when gcc\u0027s -gsplit-dwarf option is used).\n In addition objdump\u0027s --dwarf=follow-links now also affects its\n other display options, so that for example, when combined with\n --syms it will cause the symbol tables in any linked debug info\n files to also be displayed. In addition when combined with\n --disassemble the --dwarf= follow-links option will ensure that\n any symbol tables in the linked files are read and used when\n disassembling code in the main file.\n* Add support for dumping types encoded in the Compact Type Format\n to objdump and readelf.\n- Includes fixes for these CVEs:\n bsc#1126826 aka CVE-2019-9077 aka PR1126826\n bsc#1126829 aka CVE-2019-9075 aka PR1126829\n bsc#1126831 aka CVE-2019-9074 aka PR24235\n bsc#1140126 aka CVE-2019-12972 aka PR23405\n bsc#1143609 aka CVE-2019-14444 aka PR24829\n bsc#1142649 aka CVE-2019-14250 aka PR90924\n\n* Add xBPF target\n* Fix various problems with DWARF 5 support in gas\n* fix nm -B for objects compiled with -flto and -fcommon.\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-3060,SUSE-SLE-Module-Basesystem-15-SP1-2020-3060,SUSE-SLE-Module-Basesystem-15-SP2-2020-3060,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3060,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3060,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3060,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3060",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3060-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:3060-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203060-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:3060-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html"
},
{
"category": "self",
"summary": "SUSE Bug 1126826",
"url": "https://bugzilla.suse.com/1126826"
},
{
"category": "self",
"summary": "SUSE Bug 1126829",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "self",
"summary": "SUSE Bug 1126831",
"url": "https://bugzilla.suse.com/1126831"
},
{
"category": "self",
"summary": "SUSE Bug 1140126",
"url": "https://bugzilla.suse.com/1140126"
},
{
"category": "self",
"summary": "SUSE Bug 1142649",
"url": "https://bugzilla.suse.com/1142649"
},
{
"category": "self",
"summary": "SUSE Bug 1143609",
"url": "https://bugzilla.suse.com/1143609"
},
{
"category": "self",
"summary": "SUSE Bug 1153768",
"url": "https://bugzilla.suse.com/1153768"
},
{
"category": "self",
"summary": "SUSE Bug 1153770",
"url": "https://bugzilla.suse.com/1153770"
},
{
"category": "self",
"summary": "SUSE Bug 1157755",
"url": "https://bugzilla.suse.com/1157755"
},
{
"category": "self",
"summary": "SUSE Bug 1160254",
"url": "https://bugzilla.suse.com/1160254"
},
{
"category": "self",
"summary": "SUSE Bug 1160590",
"url": "https://bugzilla.suse.com/1160590"
},
{
"category": "self",
"summary": "SUSE Bug 1163333",
"url": "https://bugzilla.suse.com/1163333"
},
{
"category": "self",
"summary": "SUSE Bug 1163744",
"url": "https://bugzilla.suse.com/1163744"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12972 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14250 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14444 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17451 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17451/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9074 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9075 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9077 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9077/"
}
],
"title": "Security update for binutils",
"tracking": {
"current_release_date": "2020-10-28T07:09:50Z",
"generator": {
"date": "2020-10-28T07:09:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:3060-1",
"initial_release_date": "2020-10-28T07:09:50Z",
"revision_history": [
{
"date": "2020-10-28T07:09:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-7.11.1.aarch64",
"product": {
"name": "binutils-2.35-7.11.1.aarch64",
"product_id": "binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-7.11.1.aarch64",
"product": {
"name": "binutils-devel-2.35-7.11.1.aarch64",
"product_id": "binutils-devel-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-7.11.1.aarch64",
"product": {
"name": "binutils-gold-2.35-7.11.1.aarch64",
"product_id": "binutils-gold-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-arm-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-arm-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-avr-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-avr-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-epiphany-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-epiphany-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-hppa-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-hppa-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-hppa64-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-hppa64-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-i386-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-i386-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-ia64-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-ia64-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-m68k-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-m68k-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-mips-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-mips-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-ppc-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-ppc-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-ppc64-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-ppc64-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-ppc64le-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-ppc64le-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-riscv64-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-riscv64-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-rx-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-rx-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-s390-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-s390-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-s390x-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-s390x-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-sparc-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-sparc-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-sparc64-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-sparc64-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-spu-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-spu-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.35-7.11.1.aarch64",
"product": {
"name": "cross-x86_64-binutils-2.35-7.11.1.aarch64",
"product_id": "cross-x86_64-binutils-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-7.11.1.aarch64",
"product": {
"name": "libctf-nobfd0-2.35-7.11.1.aarch64",
"product_id": "libctf-nobfd0-2.35-7.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-7.11.1.aarch64",
"product": {
"name": "libctf0-2.35-7.11.1.aarch64",
"product_id": "libctf0-2.35-7.11.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-devel-64bit-2.35-7.11.1.aarch64_ilp32",
"product": {
"name": "binutils-devel-64bit-2.35-7.11.1.aarch64_ilp32",
"product_id": "binutils-devel-64bit-2.35-7.11.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-7.11.1.i586",
"product": {
"name": "binutils-2.35-7.11.1.i586",
"product_id": "binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-7.11.1.i586",
"product": {
"name": "binutils-devel-2.35-7.11.1.i586",
"product_id": "binutils-devel-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-7.11.1.i586",
"product": {
"name": "binutils-gold-2.35-7.11.1.i586",
"product_id": "binutils-gold-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-aarch64-binutils-2.35-7.11.1.i586",
"product_id": "cross-aarch64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-arm-binutils-2.35-7.11.1.i586",
"product_id": "cross-arm-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-avr-binutils-2.35-7.11.1.i586",
"product_id": "cross-avr-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-epiphany-binutils-2.35-7.11.1.i586",
"product_id": "cross-epiphany-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-hppa-binutils-2.35-7.11.1.i586",
"product_id": "cross-hppa-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-hppa64-binutils-2.35-7.11.1.i586",
"product_id": "cross-hppa64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-ia64-binutils-2.35-7.11.1.i586",
"product_id": "cross-ia64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-m68k-binutils-2.35-7.11.1.i586",
"product_id": "cross-m68k-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-mips-binutils-2.35-7.11.1.i586",
"product_id": "cross-mips-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-ppc-binutils-2.35-7.11.1.i586",
"product_id": "cross-ppc-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-ppc64-binutils-2.35-7.11.1.i586",
"product_id": "cross-ppc64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-ppc64le-binutils-2.35-7.11.1.i586",
"product_id": "cross-ppc64le-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-riscv64-binutils-2.35-7.11.1.i586",
"product_id": "cross-riscv64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-rx-binutils-2.35-7.11.1.i586",
"product_id": "cross-rx-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-s390-binutils-2.35-7.11.1.i586",
"product_id": "cross-s390-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-s390x-binutils-2.35-7.11.1.i586",
"product_id": "cross-s390x-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-sparc-binutils-2.35-7.11.1.i586",
"product_id": "cross-sparc-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-sparc64-binutils-2.35-7.11.1.i586",
"product_id": "cross-sparc64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-spu-binutils-2.35-7.11.1.i586",
"product_id": "cross-spu-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.35-7.11.1.i586",
"product": {
"name": "cross-x86_64-binutils-2.35-7.11.1.i586",
"product_id": "cross-x86_64-binutils-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-7.11.1.i586",
"product": {
"name": "libctf-nobfd0-2.35-7.11.1.i586",
"product_id": "libctf-nobfd0-2.35-7.11.1.i586"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-7.11.1.i586",
"product": {
"name": "libctf0-2.35-7.11.1.i586",
"product_id": "libctf0-2.35-7.11.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "binutils-2.35-7.11.1.ppc64le",
"product_id": "binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-7.11.1.ppc64le",
"product": {
"name": "binutils-devel-2.35-7.11.1.ppc64le",
"product_id": "binutils-devel-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-7.11.1.ppc64le",
"product": {
"name": "binutils-gold-2.35-7.11.1.ppc64le",
"product_id": "binutils-gold-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-aarch64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-aarch64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-arm-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-arm-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-avr-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-avr-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-epiphany-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-epiphany-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-hppa-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-hppa-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-hppa64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-hppa64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-i386-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-i386-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-ia64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-ia64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-m68k-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-m68k-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-mips-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-mips-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-ppc-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-ppc-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-ppc64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-ppc64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-riscv64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-riscv64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-rx-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-rx-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-s390-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-s390-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-s390x-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-s390x-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-sparc-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-sparc-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-sparc64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-sparc64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-spu-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-spu-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.35-7.11.1.ppc64le",
"product": {
"name": "cross-x86_64-binutils-2.35-7.11.1.ppc64le",
"product_id": "cross-x86_64-binutils-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-7.11.1.ppc64le",
"product": {
"name": "libctf-nobfd0-2.35-7.11.1.ppc64le",
"product_id": "libctf-nobfd0-2.35-7.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-7.11.1.ppc64le",
"product": {
"name": "libctf0-2.35-7.11.1.ppc64le",
"product_id": "libctf0-2.35-7.11.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-7.11.1.s390x",
"product": {
"name": "binutils-2.35-7.11.1.s390x",
"product_id": "binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-7.11.1.s390x",
"product": {
"name": "binutils-devel-2.35-7.11.1.s390x",
"product_id": "binutils-devel-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-7.11.1.s390x",
"product": {
"name": "binutils-gold-2.35-7.11.1.s390x",
"product_id": "binutils-gold-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-aarch64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-aarch64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-arm-binutils-2.35-7.11.1.s390x",
"product_id": "cross-arm-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-avr-binutils-2.35-7.11.1.s390x",
"product_id": "cross-avr-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-epiphany-binutils-2.35-7.11.1.s390x",
"product_id": "cross-epiphany-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-hppa-binutils-2.35-7.11.1.s390x",
"product_id": "cross-hppa-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-hppa64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-hppa64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-i386-binutils-2.35-7.11.1.s390x",
"product_id": "cross-i386-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-ia64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-ia64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-m68k-binutils-2.35-7.11.1.s390x",
"product_id": "cross-m68k-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-mips-binutils-2.35-7.11.1.s390x",
"product_id": "cross-mips-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-ppc-binutils-2.35-7.11.1.s390x",
"product_id": "cross-ppc-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-ppc64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-ppc64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-ppc64le-binutils-2.35-7.11.1.s390x",
"product_id": "cross-ppc64le-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-riscv64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-riscv64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-rx-binutils-2.35-7.11.1.s390x",
"product_id": "cross-rx-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-s390-binutils-2.35-7.11.1.s390x",
"product_id": "cross-s390-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-sparc-binutils-2.35-7.11.1.s390x",
"product_id": "cross-sparc-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-sparc64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-sparc64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-spu-binutils-2.35-7.11.1.s390x",
"product_id": "cross-spu-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "cross-x86_64-binutils-2.35-7.11.1.s390x",
"product": {
"name": "cross-x86_64-binutils-2.35-7.11.1.s390x",
"product_id": "cross-x86_64-binutils-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-7.11.1.s390x",
"product": {
"name": "libctf-nobfd0-2.35-7.11.1.s390x",
"product_id": "libctf-nobfd0-2.35-7.11.1.s390x"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-7.11.1.s390x",
"product": {
"name": "libctf0-2.35-7.11.1.s390x",
"product_id": "libctf0-2.35-7.11.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "binutils-2.35-7.11.1.x86_64",
"product": {
"name": "binutils-2.35-7.11.1.x86_64",
"product_id": "binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-2.35-7.11.1.x86_64",
"product": {
"name": "binutils-devel-2.35-7.11.1.x86_64",
"product_id": "binutils-devel-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-devel-32bit-2.35-7.11.1.x86_64",
"product": {
"name": "binutils-devel-32bit-2.35-7.11.1.x86_64",
"product_id": "binutils-devel-32bit-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "binutils-gold-2.35-7.11.1.x86_64",
"product": {
"name": "binutils-gold-2.35-7.11.1.x86_64",
"product_id": "binutils-gold-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-aarch64-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-aarch64-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-aarch64-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-arm-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-arm-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-arm-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-avr-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-avr-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-avr-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-epiphany-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-epiphany-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-epiphany-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-hppa-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-hppa-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-hppa64-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-hppa64-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-hppa64-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-i386-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-i386-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-i386-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ia64-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-ia64-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-ia64-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-m68k-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-m68k-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-m68k-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-mips-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-mips-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-mips-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-ppc-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-ppc-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-ppc64-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-ppc64-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-ppc64le-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-ppc64le-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-ppc64le-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-riscv64-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-riscv64-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-riscv64-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-rx-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-rx-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-rx-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-s390-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-s390-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-s390x-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-s390x-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-s390x-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-sparc-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-sparc-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-sparc64-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-sparc64-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-sparc64-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "cross-spu-binutils-2.35-7.11.1.x86_64",
"product": {
"name": "cross-spu-binutils-2.35-7.11.1.x86_64",
"product_id": "cross-spu-binutils-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libctf-nobfd0-2.35-7.11.1.x86_64",
"product": {
"name": "libctf-nobfd0-2.35-7.11.1.x86_64",
"product_id": "libctf-nobfd0-2.35-7.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libctf0-2.35-7.11.1.x86_64",
"product": {
"name": "libctf0-2.35-7.11.1.x86_64",
"product_id": "libctf0-2.35-7.11.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64"
},
"product_reference": "binutils-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le"
},
"product_reference": "binutils-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x"
},
"product_reference": "binutils-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64"
},
"product_reference": "binutils-devel-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le"
},
"product_reference": "binutils-devel-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x"
},
"product_reference": "binutils-devel-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-devel-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64"
},
"product_reference": "libctf0-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le"
},
"product_reference": "libctf0-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x"
},
"product_reference": "libctf0-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64"
},
"product_reference": "libctf0-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64"
},
"product_reference": "binutils-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le"
},
"product_reference": "binutils-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x"
},
"product_reference": "binutils-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64"
},
"product_reference": "binutils-devel-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le"
},
"product_reference": "binutils-devel-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x"
},
"product_reference": "binutils-devel-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-devel-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf-nobfd0-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64"
},
"product_reference": "libctf-nobfd0-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64"
},
"product_reference": "libctf0-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le"
},
"product_reference": "libctf0-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x"
},
"product_reference": "libctf0-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libctf0-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64"
},
"product_reference": "libctf0-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-devel-32bit-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-devel-32bit-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64"
},
"product_reference": "binutils-gold-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le"
},
"product_reference": "binutils-gold-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x"
},
"product_reference": "binutils-gold-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-gold-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64"
},
"product_reference": "binutils-gold-2.35-7.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le"
},
"product_reference": "binutils-gold-2.35-7.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x"
},
"product_reference": "binutils-gold-2.35-7.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "binutils-gold-2.35-7.11.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
},
"product_reference": "binutils-gold-2.35-7.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12972",
"url": "https://www.suse.com/security/cve/CVE-2019-12972"
},
{
"category": "external",
"summary": "SUSE Bug 1140126 for CVE-2019-12972",
"url": "https://bugzilla.suse.com/1140126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "moderate"
}
],
"title": "CVE-2019-12972"
},
{
"cve": "CVE-2019-14250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14250"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14250",
"url": "https://www.suse.com/security/cve/CVE-2019-14250"
},
{
"category": "external",
"summary": "SUSE Bug 1142649 for CVE-2019-14250",
"url": "https://bugzilla.suse.com/1142649"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "moderate"
}
],
"title": "CVE-2019-14250"
},
{
"cve": "CVE-2019-14444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14444"
}
],
"notes": [
{
"category": "general",
"text": "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14444",
"url": "https://www.suse.com/security/cve/CVE-2019-14444"
},
{
"category": "external",
"summary": "SUSE Bug 1143609 for CVE-2019-14444",
"url": "https://bugzilla.suse.com/1143609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "moderate"
}
],
"title": "CVE-2019-14444"
},
{
"cve": "CVE-2019-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17450"
}
],
"notes": [
{
"category": "general",
"text": "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17450",
"url": "https://www.suse.com/security/cve/CVE-2019-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1153770 for CVE-2019-17450",
"url": "https://bugzilla.suse.com/1153770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "moderate"
}
],
"title": "CVE-2019-17450"
},
{
"cve": "CVE-2019-17451",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17451"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17451",
"url": "https://www.suse.com/security/cve/CVE-2019-17451"
},
{
"category": "external",
"summary": "SUSE Bug 1153768 for CVE-2019-17451",
"url": "https://bugzilla.suse.com/1153768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "low"
}
],
"title": "CVE-2019-17451"
},
{
"cve": "CVE-2019-9074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9074"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9074",
"url": "https://www.suse.com/security/cve/CVE-2019-9074"
},
{
"category": "external",
"summary": "SUSE Bug 1126831 for CVE-2019-9074",
"url": "https://bugzilla.suse.com/1126831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "low"
}
],
"title": "CVE-2019-9074"
},
{
"cve": "CVE-2019-9075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9075"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9075",
"url": "https://www.suse.com/security/cve/CVE-2019-9075"
},
{
"category": "external",
"summary": "SUSE Bug 1071544 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1071544"
},
{
"category": "external",
"summary": "SUSE Bug 1126829 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1126829"
},
{
"category": "external",
"summary": "SUSE Bug 1193110 for CVE-2019-9075",
"url": "https://bugzilla.suse.com/1193110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "moderate"
}
],
"title": "CVE-2019-9075"
},
{
"cve": "CVE-2019-9077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9077"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9077",
"url": "https://www.suse.com/security/cve/CVE-2019-9077"
},
{
"category": "external",
"summary": "SUSE Bug 1126826 for CVE-2019-9077",
"url": "https://bugzilla.suse.com/1126826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:binutils-devel-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf-nobfd0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:libctf0-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:binutils-devel-32bit-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP1:binutils-gold-2.35-7.11.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP2:binutils-gold-2.35-7.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-10-28T07:09:50Z",
"details": "low"
}
],
"title": "CVE-2019-9077"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…