Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-16829
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:35:21.216Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163", }, { name: "GLSA-201811-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201811-17", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-11-15T00:00:00", descriptions: [ { lang: "en", value: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-27T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163", }, { name: "GLSA-201811-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201811-17", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-16829", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", refsource: "CONFIRM", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", }, { name: "GLSA-201811-17", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201811-17", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", refsource: "CONFIRM", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-16829", datePublished: "2017-11-15T08:00:00", dateReserved: "2017-11-15T00:00:00", dateUpdated: "2024-08-05T20:35:21.216Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2017-16829\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-11-15T08:29:00.437\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.\"},{\"lang\":\"es\",\"value\":\"La función _bfd_elf_parse_gnu_properties en elf-properties.c en la biblioteca Binary File Descriptor (BFD), conocida como libbfd, tal y como se distribuye en GNU Binutils 2.29.1 no previene los punteros negativos, lo que permite que atacantes remotos provoquen una denegación de servicio (lectura fuera de límites y cierre inesperado de la aplicación) o, posiblemente, otro impacto sin especificar mediante un archivo ELF manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40A0A80E-11FE-4454-996C-9D4299602569\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/201811-17\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=22307\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201811-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=22307\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
opensuse-su-2024:10651-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
binutils-2.37-1.3 on GA media
Notes
Title of the patch
binutils-2.37-1.3 on GA media
Description of the patch
These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10651
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "binutils-2.37-1.3 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the binutils-2.37-1.3 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10651", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10651-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-9939 page", url: "https://www.suse.com/security/cve/CVE-2014-9939/", }, { category: "self", summary: "SUSE CVE CVE-2017-12448 page", url: "https://www.suse.com/security/cve/CVE-2017-12448/", }, { category: "self", summary: "SUSE CVE CVE-2017-12450 page", url: "https://www.suse.com/security/cve/CVE-2017-12450/", }, { category: "self", summary: "SUSE CVE CVE-2017-12452 page", url: "https://www.suse.com/security/cve/CVE-2017-12452/", }, { category: "self", summary: "SUSE CVE CVE-2017-12453 page", url: "https://www.suse.com/security/cve/CVE-2017-12453/", }, { category: "self", summary: "SUSE CVE CVE-2017-12454 page", url: "https://www.suse.com/security/cve/CVE-2017-12454/", }, { category: "self", summary: "SUSE CVE CVE-2017-12456 page", url: "https://www.suse.com/security/cve/CVE-2017-12456/", }, { category: "self", summary: "SUSE CVE CVE-2017-12799 page", url: "https://www.suse.com/security/cve/CVE-2017-12799/", }, { category: "self", summary: "SUSE CVE CVE-2017-13757 page", url: "https://www.suse.com/security/cve/CVE-2017-13757/", }, { category: "self", summary: "SUSE CVE CVE-2017-14128 page", url: "https://www.suse.com/security/cve/CVE-2017-14128/", }, { category: "self", summary: "SUSE CVE CVE-2017-14129 page", url: "https://www.suse.com/security/cve/CVE-2017-14129/", }, { category: "self", summary: "SUSE CVE CVE-2017-14130 page", url: "https://www.suse.com/security/cve/CVE-2017-14130/", }, { category: "self", summary: "SUSE CVE CVE-2017-14333 page", url: "https://www.suse.com/security/cve/CVE-2017-14333/", }, { category: "self", summary: "SUSE CVE CVE-2017-14529 page", url: "https://www.suse.com/security/cve/CVE-2017-14529/", }, { category: "self", summary: "SUSE CVE CVE-2017-14729 page", url: "https://www.suse.com/security/cve/CVE-2017-14729/", }, { category: "self", summary: "SUSE CVE CVE-2017-14745 page", url: "https://www.suse.com/security/cve/CVE-2017-14745/", }, { category: "self", summary: "SUSE CVE CVE-2017-14974 page", url: "https://www.suse.com/security/cve/CVE-2017-14974/", }, { category: "self", summary: "SUSE CVE CVE-2017-15938 page", url: "https://www.suse.com/security/cve/CVE-2017-15938/", }, { category: "self", summary: "SUSE CVE CVE-2017-15939 page", url: "https://www.suse.com/security/cve/CVE-2017-15939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15996 page", url: "https://www.suse.com/security/cve/CVE-2017-15996/", }, { category: "self", summary: "SUSE CVE CVE-2017-16826 page", url: "https://www.suse.com/security/cve/CVE-2017-16826/", }, { category: "self", summary: "SUSE CVE CVE-2017-16827 page", url: "https://www.suse.com/security/cve/CVE-2017-16827/", }, { category: "self", summary: "SUSE CVE CVE-2017-16828 page", url: "https://www.suse.com/security/cve/CVE-2017-16828/", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2017-16830 page", url: "https://www.suse.com/security/cve/CVE-2017-16830/", }, { category: "self", summary: "SUSE CVE CVE-2017-16831 page", url: "https://www.suse.com/security/cve/CVE-2017-16831/", }, { category: "self", summary: "SUSE CVE CVE-2017-16832 page", url: "https://www.suse.com/security/cve/CVE-2017-16832/", }, { category: "self", summary: "SUSE CVE CVE-2017-6965 page", url: "https://www.suse.com/security/cve/CVE-2017-6965/", }, { category: "self", summary: "SUSE CVE CVE-2017-6966 page", url: "https://www.suse.com/security/cve/CVE-2017-6966/", }, { category: "self", summary: "SUSE CVE CVE-2017-6969 page", url: "https://www.suse.com/security/cve/CVE-2017-6969/", }, { category: "self", summary: "SUSE CVE CVE-2017-7209 page", url: "https://www.suse.com/security/cve/CVE-2017-7209/", }, { category: "self", summary: "SUSE CVE CVE-2017-7210 page", url: "https://www.suse.com/security/cve/CVE-2017-7210/", }, { category: "self", summary: "SUSE CVE CVE-2017-7223 page", url: "https://www.suse.com/security/cve/CVE-2017-7223/", }, { category: "self", summary: "SUSE CVE CVE-2017-7224 page", url: "https://www.suse.com/security/cve/CVE-2017-7224/", }, { category: "self", summary: "SUSE CVE CVE-2017-7225 page", url: "https://www.suse.com/security/cve/CVE-2017-7225/", }, { category: "self", summary: "SUSE CVE CVE-2017-7226 page", url: "https://www.suse.com/security/cve/CVE-2017-7226/", }, { category: "self", summary: "SUSE CVE CVE-2017-7299 page", url: "https://www.suse.com/security/cve/CVE-2017-7299/", }, { category: "self", summary: "SUSE CVE CVE-2017-7300 page", url: "https://www.suse.com/security/cve/CVE-2017-7300/", }, { category: "self", summary: "SUSE CVE CVE-2017-7301 page", url: "https://www.suse.com/security/cve/CVE-2017-7301/", }, { category: "self", summary: "SUSE CVE CVE-2017-7302 page", url: "https://www.suse.com/security/cve/CVE-2017-7302/", }, { category: "self", summary: "SUSE CVE CVE-2017-7303 page", url: "https://www.suse.com/security/cve/CVE-2017-7303/", }, { category: "self", summary: "SUSE CVE CVE-2017-7304 page", url: "https://www.suse.com/security/cve/CVE-2017-7304/", }, { category: "self", summary: "SUSE CVE CVE-2017-8392 page", url: "https://www.suse.com/security/cve/CVE-2017-8392/", }, { category: "self", summary: "SUSE CVE CVE-2017-8393 page", url: "https://www.suse.com/security/cve/CVE-2017-8393/", }, { category: "self", summary: "SUSE CVE CVE-2017-8394 page", url: "https://www.suse.com/security/cve/CVE-2017-8394/", }, { category: "self", summary: "SUSE CVE CVE-2017-8396 page", url: "https://www.suse.com/security/cve/CVE-2017-8396/", }, { category: "self", summary: "SUSE CVE CVE-2017-8421 page", url: "https://www.suse.com/security/cve/CVE-2017-8421/", }, { category: "self", summary: "SUSE CVE CVE-2017-9746 page", url: "https://www.suse.com/security/cve/CVE-2017-9746/", }, { category: "self", summary: "SUSE CVE CVE-2017-9747 page", url: "https://www.suse.com/security/cve/CVE-2017-9747/", }, { category: "self", summary: "SUSE CVE CVE-2017-9748 page", url: "https://www.suse.com/security/cve/CVE-2017-9748/", }, { category: "self", summary: "SUSE CVE CVE-2017-9750 page", url: "https://www.suse.com/security/cve/CVE-2017-9750/", }, { category: "self", summary: "SUSE CVE CVE-2017-9755 page", url: "https://www.suse.com/security/cve/CVE-2017-9755/", }, { category: "self", summary: "SUSE CVE CVE-2017-9756 page", url: "https://www.suse.com/security/cve/CVE-2017-9756/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000876 page", url: "https://www.suse.com/security/cve/CVE-2018-1000876/", }, { category: "self", summary: "SUSE CVE CVE-2018-10372 page", url: "https://www.suse.com/security/cve/CVE-2018-10372/", }, { category: "self", summary: "SUSE CVE CVE-2018-10373 page", url: "https://www.suse.com/security/cve/CVE-2018-10373/", }, { category: "self", summary: "SUSE CVE CVE-2018-10534 page", url: "https://www.suse.com/security/cve/CVE-2018-10534/", }, { category: "self", summary: "SUSE CVE CVE-2018-10535 page", url: "https://www.suse.com/security/cve/CVE-2018-10535/", }, { category: "self", summary: "SUSE CVE CVE-2018-17358 page", url: "https://www.suse.com/security/cve/CVE-2018-17358/", }, { category: "self", summary: "SUSE CVE CVE-2018-17359 page", url: "https://www.suse.com/security/cve/CVE-2018-17359/", }, { category: "self", summary: "SUSE CVE CVE-2018-17360 page", url: "https://www.suse.com/security/cve/CVE-2018-17360/", }, { category: "self", summary: "SUSE CVE CVE-2018-17985 page", url: "https://www.suse.com/security/cve/CVE-2018-17985/", }, { category: "self", summary: "SUSE CVE CVE-2018-18309 page", url: "https://www.suse.com/security/cve/CVE-2018-18309/", }, { category: "self", summary: "SUSE CVE CVE-2018-18483 page", url: "https://www.suse.com/security/cve/CVE-2018-18483/", }, { category: "self", summary: "SUSE CVE CVE-2018-18484 page", url: "https://www.suse.com/security/cve/CVE-2018-18484/", }, { category: "self", summary: "SUSE CVE CVE-2018-18605 page", url: "https://www.suse.com/security/cve/CVE-2018-18605/", }, { category: "self", summary: "SUSE CVE CVE-2018-18606 page", url: "https://www.suse.com/security/cve/CVE-2018-18606/", }, { category: "self", summary: "SUSE CVE CVE-2018-18607 page", url: "https://www.suse.com/security/cve/CVE-2018-18607/", }, { category: "self", summary: "SUSE CVE CVE-2018-19931 page", url: "https://www.suse.com/security/cve/CVE-2018-19931/", }, { category: "self", summary: "SUSE CVE CVE-2018-19932 page", url: "https://www.suse.com/security/cve/CVE-2018-19932/", }, { category: "self", summary: "SUSE CVE CVE-2018-20623 page", url: "https://www.suse.com/security/cve/CVE-2018-20623/", }, { category: "self", summary: "SUSE CVE CVE-2018-20651 page", url: "https://www.suse.com/security/cve/CVE-2018-20651/", }, { category: "self", summary: "SUSE CVE CVE-2018-20671 page", url: "https://www.suse.com/security/cve/CVE-2018-20671/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010180 page", url: "https://www.suse.com/security/cve/CVE-2019-1010180/", }, { category: "self", summary: "SUSE CVE CVE-2019-12972 page", url: "https://www.suse.com/security/cve/CVE-2019-12972/", }, { category: "self", summary: "SUSE CVE CVE-2019-14250 page", url: "https://www.suse.com/security/cve/CVE-2019-14250/", }, { category: "self", summary: "SUSE CVE CVE-2019-14444 page", url: "https://www.suse.com/security/cve/CVE-2019-14444/", }, { category: "self", summary: "SUSE CVE CVE-2019-17450 page", url: "https://www.suse.com/security/cve/CVE-2019-17450/", }, { category: "self", summary: "SUSE CVE CVE-2019-17451 page", url: "https://www.suse.com/security/cve/CVE-2019-17451/", }, { category: "self", summary: "SUSE CVE CVE-2019-9074 page", url: "https://www.suse.com/security/cve/CVE-2019-9074/", }, { category: "self", summary: "SUSE CVE CVE-2019-9075 page", url: "https://www.suse.com/security/cve/CVE-2019-9075/", }, { category: "self", summary: "SUSE CVE CVE-2019-9077 page", url: "https://www.suse.com/security/cve/CVE-2019-9077/", }, { category: "self", summary: "SUSE CVE CVE-2020-16590 page", url: "https://www.suse.com/security/cve/CVE-2020-16590/", }, { category: "self", summary: "SUSE CVE CVE-2020-16591 page", url: "https://www.suse.com/security/cve/CVE-2020-16591/", }, { category: "self", summary: "SUSE CVE CVE-2020-16592 page", url: "https://www.suse.com/security/cve/CVE-2020-16592/", }, { category: "self", summary: "SUSE CVE CVE-2020-16593 page", url: "https://www.suse.com/security/cve/CVE-2020-16593/", }, { category: "self", summary: "SUSE CVE CVE-2020-16598 page", url: "https://www.suse.com/security/cve/CVE-2020-16598/", }, { category: "self", summary: "SUSE CVE CVE-2020-16599 page", url: "https://www.suse.com/security/cve/CVE-2020-16599/", }, { category: "self", summary: "SUSE CVE CVE-2020-35448 page", url: "https://www.suse.com/security/cve/CVE-2020-35448/", }, { category: "self", summary: "SUSE CVE CVE-2020-35493 page", url: "https://www.suse.com/security/cve/CVE-2020-35493/", }, { category: "self", summary: "SUSE CVE CVE-2020-35496 page", url: "https://www.suse.com/security/cve/CVE-2020-35496/", }, { category: "self", summary: "SUSE CVE CVE-2020-35507 page", url: "https://www.suse.com/security/cve/CVE-2020-35507/", }, { category: "self", summary: "SUSE CVE CVE-2021-20197 page", url: "https://www.suse.com/security/cve/CVE-2021-20197/", }, { category: "self", summary: "SUSE CVE CVE-2021-20284 page", url: "https://www.suse.com/security/cve/CVE-2021-20284/", }, { category: "self", summary: "SUSE CVE CVE-2021-3487 page", url: "https://www.suse.com/security/cve/CVE-2021-3487/", }, ], title: "binutils-2.37-1.3 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10651-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.37-1.3.aarch64", product: { name: "binutils-2.37-1.3.aarch64", product_id: "binutils-2.37-1.3.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.aarch64", product: { name: "binutils-devel-2.37-1.3.aarch64", product_id: "binutils-devel-2.37-1.3.aarch64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.aarch64", product: { name: "binutils-devel-32bit-2.37-1.3.aarch64", product_id: "binutils-devel-32bit-2.37-1.3.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.aarch64", product: { name: "binutils-gold-2.37-1.3.aarch64", product_id: "binutils-gold-2.37-1.3.aarch64", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.aarch64", product: { name: "libctf-nobfd0-2.37-1.3.aarch64", product_id: "libctf-nobfd0-2.37-1.3.aarch64", }, }, { category: "product_version", name: "libctf0-2.37-1.3.aarch64", product: { name: "libctf0-2.37-1.3.aarch64", product_id: "libctf0-2.37-1.3.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-2.37-1.3.ppc64le", product: { name: "binutils-2.37-1.3.ppc64le", product_id: "binutils-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.ppc64le", product: { name: "binutils-devel-2.37-1.3.ppc64le", product_id: "binutils-devel-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.ppc64le", product: { name: "binutils-devel-32bit-2.37-1.3.ppc64le", product_id: "binutils-devel-32bit-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.ppc64le", product: { name: "binutils-gold-2.37-1.3.ppc64le", product_id: "binutils-gold-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.ppc64le", product: { name: "libctf-nobfd0-2.37-1.3.ppc64le", product_id: "libctf-nobfd0-2.37-1.3.ppc64le", }, }, { category: "product_version", name: "libctf0-2.37-1.3.ppc64le", product: { name: "libctf0-2.37-1.3.ppc64le", product_id: "libctf0-2.37-1.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.37-1.3.s390x", product: { name: "binutils-2.37-1.3.s390x", product_id: "binutils-2.37-1.3.s390x", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.s390x", product: { name: "binutils-devel-2.37-1.3.s390x", product_id: "binutils-devel-2.37-1.3.s390x", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.s390x", product: { name: "binutils-devel-32bit-2.37-1.3.s390x", product_id: "binutils-devel-32bit-2.37-1.3.s390x", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.s390x", product: { name: "binutils-gold-2.37-1.3.s390x", product_id: "binutils-gold-2.37-1.3.s390x", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.s390x", product: { name: "libctf-nobfd0-2.37-1.3.s390x", product_id: "libctf-nobfd0-2.37-1.3.s390x", }, }, { category: "product_version", name: "libctf0-2.37-1.3.s390x", product: { name: "libctf0-2.37-1.3.s390x", product_id: "libctf0-2.37-1.3.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.37-1.3.x86_64", product: { name: "binutils-2.37-1.3.x86_64", product_id: "binutils-2.37-1.3.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.37-1.3.x86_64", product: { name: "binutils-devel-2.37-1.3.x86_64", product_id: "binutils-devel-2.37-1.3.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.37-1.3.x86_64", product: { name: "binutils-devel-32bit-2.37-1.3.x86_64", product_id: "binutils-devel-32bit-2.37-1.3.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.37-1.3.x86_64", product: { name: "binutils-gold-2.37-1.3.x86_64", product_id: "binutils-gold-2.37-1.3.x86_64", }, }, { category: "product_version", name: "libctf-nobfd0-2.37-1.3.x86_64", product: { name: "libctf-nobfd0-2.37-1.3.x86_64", product_id: "libctf-nobfd0-2.37-1.3.x86_64", }, }, { category: "product_version", name: "libctf0-2.37-1.3.x86_64", product: { name: "libctf0-2.37-1.3.x86_64", product_id: "libctf0-2.37-1.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", }, product_reference: "binutils-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", }, product_reference: "binutils-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", }, product_reference: "binutils-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", }, product_reference: "binutils-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", }, product_reference: "binutils-devel-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", }, product_reference: "binutils-devel-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", }, product_reference: "binutils-devel-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", }, product_reference: "binutils-devel-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", }, product_reference: "binutils-devel-32bit-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", }, product_reference: "binutils-devel-32bit-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", }, product_reference: "binutils-devel-32bit-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", }, product_reference: "binutils-devel-32bit-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", }, product_reference: "binutils-gold-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", }, product_reference: "binutils-gold-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", }, product_reference: "binutils-gold-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", }, product_reference: "binutils-gold-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", }, product_reference: "libctf-nobfd0-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", }, product_reference: "libctf-nobfd0-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", }, product_reference: "libctf-nobfd0-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", }, product_reference: "libctf-nobfd0-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", }, product_reference: "libctf0-2.37-1.3.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", }, product_reference: "libctf0-2.37-1.3.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", }, product_reference: "libctf0-2.37-1.3.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.37-1.3.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", }, product_reference: "libctf0-2.37-1.3.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9939", }, ], notes: [ { category: "general", text: "ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9939", url: "https://www.suse.com/security/cve/CVE-2014-9939", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2014-9939", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2014-9939", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-9939", }, { cve: "CVE-2017-12448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12448", }, ], notes: [ { category: "general", text: "The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12448", url: "https://www.suse.com/security/cve/CVE-2017-12448", }, { category: "external", summary: "SUSE Bug 1052518 for CVE-2017-12448", url: "https://bugzilla.suse.com/1052518", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12448", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12448", }, { cve: "CVE-2017-12450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12450", }, ], notes: [ { category: "general", text: "The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12450", url: "https://www.suse.com/security/cve/CVE-2017-12450", }, { category: "external", summary: "SUSE Bug 1052514 for CVE-2017-12450", url: "https://bugzilla.suse.com/1052514", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12450", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12450", }, { cve: "CVE-2017-12452", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12452", }, ], notes: [ { category: "general", text: "The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12452", url: "https://www.suse.com/security/cve/CVE-2017-12452", }, { category: "external", summary: "SUSE Bug 1052511 for CVE-2017-12452", url: "https://bugzilla.suse.com/1052511", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12452", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12452", }, { cve: "CVE-2017-12453", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12453", }, ], notes: [ { category: "general", text: "The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12453", url: "https://www.suse.com/security/cve/CVE-2017-12453", }, { category: "external", summary: "SUSE Bug 1052509 for CVE-2017-12453", url: "https://bugzilla.suse.com/1052509", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12453", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12453", }, { cve: "CVE-2017-12454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12454", }, ], notes: [ { category: "general", text: "The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12454", url: "https://www.suse.com/security/cve/CVE-2017-12454", }, { category: "external", summary: "SUSE Bug 1052507 for CVE-2017-12454", url: "https://bugzilla.suse.com/1052507", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12454", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12454", }, { cve: "CVE-2017-12456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12456", }, ], notes: [ { category: "general", text: "The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12456", url: "https://www.suse.com/security/cve/CVE-2017-12456", }, { category: "external", summary: "SUSE Bug 1052503 for CVE-2017-12456", url: "https://bugzilla.suse.com/1052503", }, { category: "external", summary: "SUSE Bug 1059785 for CVE-2017-12456", url: "https://bugzilla.suse.com/1059785", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-12456", }, { cve: "CVE-2017-12799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12799", }, ], notes: [ { category: "general", text: "The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12799", url: "https://www.suse.com/security/cve/CVE-2017-12799", }, { category: "external", summary: "SUSE Bug 1053347 for CVE-2017-12799", url: "https://bugzilla.suse.com/1053347", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12799", }, { cve: "CVE-2017-13757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-13757", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-13757", url: "https://www.suse.com/security/cve/CVE-2017-13757", }, { category: "external", summary: "SUSE Bug 1056312 for CVE-2017-13757", url: "https://bugzilla.suse.com/1056312", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-13757", }, { cve: "CVE-2017-14128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14128", }, ], notes: [ { category: "general", text: "The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14128", url: "https://www.suse.com/security/cve/CVE-2017-14128", }, { category: "external", summary: "SUSE Bug 1057139 for CVE-2017-14128", url: "https://bugzilla.suse.com/1057139", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14128", }, { cve: "CVE-2017-14129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14129", }, ], notes: [ { category: "general", text: "The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14129", url: "https://www.suse.com/security/cve/CVE-2017-14129", }, { category: "external", summary: "SUSE Bug 1057144 for CVE-2017-14129", url: "https://bugzilla.suse.com/1057144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14129", }, { cve: "CVE-2017-14130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14130", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14130", url: "https://www.suse.com/security/cve/CVE-2017-14130", }, { category: "external", summary: "SUSE Bug 1057149 for CVE-2017-14130", url: "https://bugzilla.suse.com/1057149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14130", }, { cve: "CVE-2017-14333", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14333", }, ], notes: [ { category: "general", text: "The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during \"readelf -a\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14333", url: "https://www.suse.com/security/cve/CVE-2017-14333", }, { category: "external", summary: "SUSE Bug 1058480 for CVE-2017-14333", url: "https://bugzilla.suse.com/1058480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-14333", }, { cve: "CVE-2017-14529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14529", }, ], notes: [ { category: "general", text: "The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14529", url: "https://www.suse.com/security/cve/CVE-2017-14529", }, { category: "external", summary: "SUSE Bug 1059050 for CVE-2017-14529", url: "https://bugzilla.suse.com/1059050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14529", }, { cve: "CVE-2017-14729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14729", }, ], notes: [ { category: "general", text: "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14729", url: "https://www.suse.com/security/cve/CVE-2017-14729", }, { category: "external", summary: "SUSE Bug 1060621 for CVE-2017-14729", url: "https://bugzilla.suse.com/1060621", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-14729", }, { cve: "CVE-2017-14745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14745", }, ], notes: [ { category: "general", text: "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14745", url: "https://www.suse.com/security/cve/CVE-2017-14745", }, { category: "external", summary: "SUSE Bug 1060599 for CVE-2017-14745", url: "https://bugzilla.suse.com/1060599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-14745", }, { cve: "CVE-2017-14974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14974", }, ], notes: [ { category: "general", text: "The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14974", url: "https://www.suse.com/security/cve/CVE-2017-14974", }, { category: "external", summary: "SUSE Bug 1061241 for CVE-2017-14974", url: "https://bugzilla.suse.com/1061241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14974", }, { cve: "CVE-2017-15938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15938", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15938", url: "https://www.suse.com/security/cve/CVE-2017-15938", }, { category: "external", summary: "SUSE Bug 1065693 for CVE-2017-15938", url: "https://bugzilla.suse.com/1065693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-15938", }, { cve: "CVE-2017-15939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15939", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15939", url: "https://www.suse.com/security/cve/CVE-2017-15939", }, { category: "external", summary: "SUSE Bug 1061623 for CVE-2017-15939", url: "https://bugzilla.suse.com/1061623", }, { category: "external", summary: "SUSE Bug 1065689 for CVE-2017-15939", url: "https://bugzilla.suse.com/1065689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15939", }, { cve: "CVE-2017-15996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15996", }, ], notes: [ { category: "general", text: "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15996", url: "https://www.suse.com/security/cve/CVE-2017-15996", }, { category: "external", summary: "SUSE Bug 1065643 for CVE-2017-15996", url: "https://bugzilla.suse.com/1065643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-15996", }, { cve: "CVE-2017-16826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16826", }, ], notes: [ { category: "general", text: "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16826", url: "https://www.suse.com/security/cve/CVE-2017-16826", }, { category: "external", summary: "SUSE Bug 1068640 for CVE-2017-16826", url: "https://bugzilla.suse.com/1068640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16826", }, { cve: "CVE-2017-16827", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16827", }, ], notes: [ { category: "general", text: "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16827", url: "https://www.suse.com/security/cve/CVE-2017-16827", }, { category: "external", summary: "SUSE Bug 1069202 for CVE-2017-16827", url: "https://bugzilla.suse.com/1069202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16827", }, { cve: "CVE-2017-16828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16828", }, ], notes: [ { category: "general", text: "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16828", url: "https://www.suse.com/security/cve/CVE-2017-16828", }, { category: "external", summary: "SUSE Bug 1069176 for CVE-2017-16828", url: "https://bugzilla.suse.com/1069176", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-16828", }, { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2017-16830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16830", }, ], notes: [ { category: "general", text: "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16830", url: "https://www.suse.com/security/cve/CVE-2017-16830", }, { category: "external", summary: "SUSE Bug 1068888 for CVE-2017-16830", url: "https://bugzilla.suse.com/1068888", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-16830", }, { cve: "CVE-2017-16831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16831", }, ], notes: [ { category: "general", text: "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16831", url: "https://www.suse.com/security/cve/CVE-2017-16831", }, { category: "external", summary: "SUSE Bug 1068887 for CVE-2017-16831", url: "https://bugzilla.suse.com/1068887", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16831", }, { cve: "CVE-2017-16832", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16832", }, ], notes: [ { category: "general", text: "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16832", url: "https://www.suse.com/security/cve/CVE-2017-16832", }, { category: "external", summary: "SUSE Bug 1068643 for CVE-2017-16832", url: "https://bugzilla.suse.com/1068643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16832", }, { cve: "CVE-2017-6965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6965", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6965", url: "https://www.suse.com/security/cve/CVE-2017-6965", }, { category: "external", summary: "SUSE Bug 1029909 for CVE-2017-6965", url: "https://bugzilla.suse.com/1029909", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-6965", }, { cve: "CVE-2017-6966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6966", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6966", url: "https://www.suse.com/security/cve/CVE-2017-6966", }, { category: "external", summary: "SUSE Bug 1029908 for CVE-2017-6966", url: "https://bugzilla.suse.com/1029908", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-6966", }, { cve: "CVE-2017-6969", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6969", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6969", url: "https://www.suse.com/security/cve/CVE-2017-6969", }, { category: "external", summary: "SUSE Bug 1029907 for CVE-2017-6969", url: "https://bugzilla.suse.com/1029907", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-6969", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-6969", }, { cve: "CVE-2017-7209", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7209", }, ], notes: [ { category: "general", text: "The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7209", url: "https://www.suse.com/security/cve/CVE-2017-7209", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030298 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7209", }, { cve: "CVE-2017-7210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7210", }, ], notes: [ { category: "general", text: "objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7210", url: "https://www.suse.com/security/cve/CVE-2017-7210", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030297 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7210", }, { cve: "CVE-2017-7223", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7223", }, ], notes: [ { category: "general", text: "GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7223", url: "https://www.suse.com/security/cve/CVE-2017-7223", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030589 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7223", }, { cve: "CVE-2017-7224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7224", }, ], notes: [ { category: "general", text: "The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7224", url: "https://www.suse.com/security/cve/CVE-2017-7224", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030588 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7224", }, { cve: "CVE-2017-7225", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7225", }, ], notes: [ { category: "general", text: "The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7225", url: "https://www.suse.com/security/cve/CVE-2017-7225", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030585 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030585", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7225", }, { cve: "CVE-2017-7226", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7226", }, ], notes: [ { category: "general", text: "The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7226", url: "https://www.suse.com/security/cve/CVE-2017-7226", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030584 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030584", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-7226", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2017-7226", }, { cve: "CVE-2017-7299", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7299", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7299", url: "https://www.suse.com/security/cve/CVE-2017-7299", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7299", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031644 for CVE-2017-7299", url: "https://bugzilla.suse.com/1031644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7299", }, { cve: "CVE-2017-7300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7300", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7300", url: "https://www.suse.com/security/cve/CVE-2017-7300", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7300", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031656 for CVE-2017-7300", url: "https://bugzilla.suse.com/1031656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-7300", }, { cve: "CVE-2017-7301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7301", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7301", url: "https://www.suse.com/security/cve/CVE-2017-7301", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7301", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031638 for CVE-2017-7301", url: "https://bugzilla.suse.com/1031638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7301", }, { cve: "CVE-2017-7302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7302", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7302", url: "https://www.suse.com/security/cve/CVE-2017-7302", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7302", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031595 for CVE-2017-7302", url: "https://bugzilla.suse.com/1031595", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7302", }, { cve: "CVE-2017-7303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7303", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7303", url: "https://www.suse.com/security/cve/CVE-2017-7303", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7303", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031593 for CVE-2017-7303", url: "https://bugzilla.suse.com/1031593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-7303", }, { cve: "CVE-2017-7304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7304", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7304", url: "https://www.suse.com/security/cve/CVE-2017-7304", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7304", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031590 for CVE-2017-7304", url: "https://bugzilla.suse.com/1031590", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7304", }, { cve: "CVE-2017-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8392", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8392", url: "https://www.suse.com/security/cve/CVE-2017-8392", }, { category: "external", summary: "SUSE Bug 1037052 for CVE-2017-8392", url: "https://bugzilla.suse.com/1037052", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8392", }, { cve: "CVE-2017-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8393", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8393", url: "https://www.suse.com/security/cve/CVE-2017-8393", }, { category: "external", summary: "SUSE Bug 1037057 for CVE-2017-8393", url: "https://bugzilla.suse.com/1037057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-8393", }, { cve: "CVE-2017-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8394", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8394", url: "https://www.suse.com/security/cve/CVE-2017-8394", }, { category: "external", summary: "SUSE Bug 1037061 for CVE-2017-8394", url: "https://bugzilla.suse.com/1037061", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-8394", }, { cve: "CVE-2017-8396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8396", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8396", url: "https://www.suse.com/security/cve/CVE-2017-8396", }, { category: "external", summary: "SUSE Bug 1037066 for CVE-2017-8396", url: "https://bugzilla.suse.com/1037066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8396", }, { cve: "CVE-2017-8421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8421", }, ], notes: [ { category: "general", text: "The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8421", url: "https://www.suse.com/security/cve/CVE-2017-8421", }, { category: "external", summary: "SUSE Bug 1037273 for CVE-2017-8421", url: "https://bugzilla.suse.com/1037273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8421", }, { cve: "CVE-2017-9746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9746", }, ], notes: [ { category: "general", text: "The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9746", url: "https://www.suse.com/security/cve/CVE-2017-9746", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9746", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044891 for CVE-2017-9746", url: "https://bugzilla.suse.com/1044891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9746", }, { cve: "CVE-2017-9747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9747", }, ], notes: [ { category: "general", text: "The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9747", url: "https://www.suse.com/security/cve/CVE-2017-9747", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9747", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044897 for CVE-2017-9747", url: "https://bugzilla.suse.com/1044897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9747", }, { cve: "CVE-2017-9748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9748", }, ], notes: [ { category: "general", text: "The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9748", url: "https://www.suse.com/security/cve/CVE-2017-9748", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9748", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044901 for CVE-2017-9748", url: "https://bugzilla.suse.com/1044901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9748", }, { cve: "CVE-2017-9750", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9750", }, ], notes: [ { category: "general", text: "opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9750", url: "https://www.suse.com/security/cve/CVE-2017-9750", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9750", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044909 for CVE-2017-9750", url: "https://bugzilla.suse.com/1044909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9750", }, { cve: "CVE-2017-9755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9755", }, ], notes: [ { category: "general", text: "opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9755", url: "https://www.suse.com/security/cve/CVE-2017-9755", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9755", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044925 for CVE-2017-9755", url: "https://bugzilla.suse.com/1044925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-9755", }, { cve: "CVE-2017-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9756", }, ], notes: [ { category: "general", text: "The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9756", url: "https://www.suse.com/security/cve/CVE-2017-9756", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9756", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044927 for CVE-2017-9756", url: "https://bugzilla.suse.com/1044927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-9756", }, { cve: "CVE-2018-1000876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000876", }, ], notes: [ { category: "general", text: "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000876", url: "https://www.suse.com/security/cve/CVE-2018-1000876", }, { category: "external", summary: "SUSE Bug 1120640 for CVE-2018-1000876", url: "https://bugzilla.suse.com/1120640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000876", }, { cve: "CVE-2018-10372", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10372", }, ], notes: [ { category: "general", text: "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10372", url: "https://www.suse.com/security/cve/CVE-2018-10372", }, { category: "external", summary: "SUSE Bug 1091015 for CVE-2018-10372", url: "https://bugzilla.suse.com/1091015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-10372", }, { cve: "CVE-2018-10373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10373", }, ], notes: [ { category: "general", text: "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10373", url: "https://www.suse.com/security/cve/CVE-2018-10373", }, { category: "external", summary: "SUSE Bug 1090997 for CVE-2018-10373", url: "https://bugzilla.suse.com/1090997", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-10373", }, { cve: "CVE-2018-10534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10534", }, ], notes: [ { category: "general", text: "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10534", url: "https://www.suse.com/security/cve/CVE-2018-10534", }, { category: "external", summary: "SUSE Bug 1091368 for CVE-2018-10534", url: "https://bugzilla.suse.com/1091368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10534", }, { cve: "CVE-2018-10535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10535", }, ], notes: [ { category: "general", text: "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10535", url: "https://www.suse.com/security/cve/CVE-2018-10535", }, { category: "external", summary: "SUSE Bug 1091365 for CVE-2018-10535", url: "https://bugzilla.suse.com/1091365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-10535", }, { cve: "CVE-2018-17358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17358", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17358", url: "https://www.suse.com/security/cve/CVE-2018-17358", }, { category: "external", summary: "SUSE Bug 1109412 for CVE-2018-17358", url: "https://bugzilla.suse.com/1109412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-17358", }, { cve: "CVE-2018-17359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17359", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17359", url: "https://www.suse.com/security/cve/CVE-2018-17359", }, { category: "external", summary: "SUSE Bug 1109413 for CVE-2018-17359", url: "https://bugzilla.suse.com/1109413", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-17359", }, { cve: "CVE-2018-17360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17360", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17360", url: "https://www.suse.com/security/cve/CVE-2018-17360", }, { category: "external", summary: "SUSE Bug 1109414 for CVE-2018-17360", url: "https://bugzilla.suse.com/1109414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-17360", }, { cve: "CVE-2018-17985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17985", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17985", url: "https://www.suse.com/security/cve/CVE-2018-17985", }, { category: "external", summary: "SUSE Bug 1116827 for CVE-2018-17985", url: "https://bugzilla.suse.com/1116827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-17985", }, { cve: "CVE-2018-18309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18309", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18309", url: "https://www.suse.com/security/cve/CVE-2018-18309", }, { category: "external", summary: "SUSE Bug 1111996 for CVE-2018-18309", url: "https://bugzilla.suse.com/1111996", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-18309", }, { cve: "CVE-2018-18483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18483", }, ], notes: [ { category: "general", text: "The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18483", url: "https://www.suse.com/security/cve/CVE-2018-18483", }, { category: "external", summary: "SUSE Bug 1112535 for CVE-2018-18483", url: "https://bugzilla.suse.com/1112535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18483", }, { cve: "CVE-2018-18484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18484", }, ], notes: [ { category: "general", text: "An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18484", url: "https://www.suse.com/security/cve/CVE-2018-18484", }, { category: "external", summary: "SUSE Bug 1112534 for CVE-2018-18484", url: "https://bugzilla.suse.com/1112534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18484", }, { cve: "CVE-2018-18605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18605", }, ], notes: [ { category: "general", text: "A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18605", url: "https://www.suse.com/security/cve/CVE-2018-18605", }, { category: "external", summary: "SUSE Bug 1113255 for CVE-2018-18605", url: "https://bugzilla.suse.com/1113255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18605", }, { cve: "CVE-2018-18606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18606", }, ], notes: [ { category: "general", text: "An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18606", url: "https://www.suse.com/security/cve/CVE-2018-18606", }, { category: "external", summary: "SUSE Bug 1113252 for CVE-2018-18606", url: "https://bugzilla.suse.com/1113252", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-18606", }, { cve: "CVE-2018-18607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18607", }, ], notes: [ { category: "general", text: "An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18607", url: "https://www.suse.com/security/cve/CVE-2018-18607", }, { category: "external", summary: "SUSE Bug 1113247 for CVE-2018-18607", url: "https://bugzilla.suse.com/1113247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-18607", }, { cve: "CVE-2018-19931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19931", url: "https://www.suse.com/security/cve/CVE-2018-19931", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19931", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-19931", }, { cve: "CVE-2018-19932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19932", url: "https://www.suse.com/security/cve/CVE-2018-19932", }, { category: "external", summary: "SUSE Bug 1118830 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118830", }, { category: "external", summary: "SUSE Bug 1118831 for CVE-2018-19932", url: "https://bugzilla.suse.com/1118831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-19932", }, { cve: "CVE-2018-20623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20623", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20623", url: "https://www.suse.com/security/cve/CVE-2018-20623", }, { category: "external", summary: "SUSE Bug 1121035 for CVE-2018-20623", url: "https://bugzilla.suse.com/1121035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-20623", }, { cve: "CVE-2018-20651", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20651", }, ], notes: [ { category: "general", text: "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20651", url: "https://www.suse.com/security/cve/CVE-2018-20651", }, { category: "external", summary: "SUSE Bug 1121034 for CVE-2018-20651", url: "https://bugzilla.suse.com/1121034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-20651", }, { cve: "CVE-2018-20671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20671", }, ], notes: [ { category: "general", text: "load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20671", url: "https://www.suse.com/security/cve/CVE-2018-20671", }, { category: "external", summary: "SUSE Bug 1121056 for CVE-2018-20671", url: "https://bugzilla.suse.com/1121056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-20671", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-8945", }, { cve: "CVE-2019-1010180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010180", }, ], notes: [ { category: "general", text: "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010180", url: "https://www.suse.com/security/cve/CVE-2019-1010180", }, { category: "external", summary: "SUSE Bug 1142772 for CVE-2019-1010180", url: "https://bugzilla.suse.com/1142772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1010180", }, { cve: "CVE-2019-12972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12972", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\\0' character.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12972", url: "https://www.suse.com/security/cve/CVE-2019-12972", }, { category: "external", summary: "SUSE Bug 1140126 for CVE-2019-12972", url: "https://bugzilla.suse.com/1140126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-12972", }, { cve: "CVE-2019-14250", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14250", }, ], notes: [ { category: "general", text: "An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14250", url: "https://www.suse.com/security/cve/CVE-2019-14250", }, { category: "external", summary: "SUSE Bug 1142649 for CVE-2019-14250", url: "https://bugzilla.suse.com/1142649", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14250", }, { cve: "CVE-2019-14444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14444", }, ], notes: [ { category: "general", text: "apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14444", url: "https://www.suse.com/security/cve/CVE-2019-14444", }, { category: "external", summary: "SUSE Bug 1143609 for CVE-2019-14444", url: "https://bugzilla.suse.com/1143609", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-14444", }, { cve: "CVE-2019-17450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17450", }, ], notes: [ { category: "general", text: "find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17450", url: "https://www.suse.com/security/cve/CVE-2019-17450", }, { category: "external", summary: "SUSE Bug 1153770 for CVE-2019-17450", url: "https://bugzilla.suse.com/1153770", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-17450", }, { cve: "CVE-2019-17451", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17451", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17451", url: "https://www.suse.com/security/cve/CVE-2019-17451", }, { category: "external", summary: "SUSE Bug 1153768 for CVE-2019-17451", url: "https://bugzilla.suse.com/1153768", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-17451", }, { cve: "CVE-2019-9074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9074", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9074", url: "https://www.suse.com/security/cve/CVE-2019-9074", }, { category: "external", summary: "SUSE Bug 1126831 for CVE-2019-9074", url: "https://bugzilla.suse.com/1126831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9074", }, { cve: "CVE-2019-9075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9075", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9075", url: "https://www.suse.com/security/cve/CVE-2019-9075", }, { category: "external", summary: "SUSE Bug 1071544 for CVE-2019-9075", url: "https://bugzilla.suse.com/1071544", }, { category: "external", summary: "SUSE Bug 1126829 for CVE-2019-9075", url: "https://bugzilla.suse.com/1126829", }, { category: "external", summary: "SUSE Bug 1193110 for CVE-2019-9075", url: "https://bugzilla.suse.com/1193110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-9075", }, { cve: "CVE-2019-9077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9077", }, ], notes: [ { category: "general", text: "An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9077", url: "https://www.suse.com/security/cve/CVE-2019-9077", }, { category: "external", summary: "SUSE Bug 1126826 for CVE-2019-9077", url: "https://bugzilla.suse.com/1126826", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9077", }, { cve: "CVE-2020-16590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16590", }, ], notes: [ { category: "general", text: "A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16590", url: "https://www.suse.com/security/cve/CVE-2020-16590", }, { category: "external", summary: "SUSE Bug 1179898 for CVE-2020-16590", url: "https://bugzilla.suse.com/1179898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-16590", }, { cve: "CVE-2020-16591", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16591", }, ], notes: [ { category: "general", text: "A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16591", url: "https://www.suse.com/security/cve/CVE-2020-16591", }, { category: "external", summary: "SUSE Bug 1179899 for CVE-2020-16591", url: "https://bugzilla.suse.com/1179899", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16591", }, { cve: "CVE-2020-16592", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16592", }, ], notes: [ { category: "general", text: "A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16592", url: "https://www.suse.com/security/cve/CVE-2020-16592", }, { category: "external", summary: "SUSE Bug 1179900 for CVE-2020-16592", url: "https://bugzilla.suse.com/1179900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16592", }, { cve: "CVE-2020-16593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16593", }, ], notes: [ { category: "general", text: "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16593", url: "https://www.suse.com/security/cve/CVE-2020-16593", }, { category: "external", summary: "SUSE Bug 1179901 for CVE-2020-16593", url: "https://bugzilla.suse.com/1179901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16593", }, { cve: "CVE-2020-16598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16598", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16598", url: "https://www.suse.com/security/cve/CVE-2020-16598", }, { category: "external", summary: "SUSE Bug 1179902 for CVE-2020-16598", url: "https://bugzilla.suse.com/1179902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-16598", }, { cve: "CVE-2020-16599", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16599", }, ], notes: [ { category: "general", text: "A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16599", url: "https://www.suse.com/security/cve/CVE-2020-16599", }, { category: "external", summary: "SUSE Bug 1179903 for CVE-2020-16599", url: "https://bugzilla.suse.com/1179903", }, { category: "external", summary: "SUSE Bug 1206080 for CVE-2020-16599", url: "https://bugzilla.suse.com/1206080", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-16599", }, { cve: "CVE-2020-35448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35448", }, ], notes: [ { category: "general", text: "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35448", url: "https://www.suse.com/security/cve/CVE-2020-35448", }, { category: "external", summary: "SUSE Bug 1184794 for CVE-2020-35448", url: "https://bugzilla.suse.com/1184794", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35448", }, { cve: "CVE-2020-35493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35493", }, ], notes: [ { category: "general", text: "A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35493", url: "https://www.suse.com/security/cve/CVE-2020-35493", }, { category: "external", summary: "SUSE Bug 1180451 for CVE-2020-35493", url: "https://bugzilla.suse.com/1180451", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35493", }, { cve: "CVE-2020-35496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35496", }, ], notes: [ { category: "general", text: "There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35496", url: "https://www.suse.com/security/cve/CVE-2020-35496", }, { category: "external", summary: "SUSE Bug 1180454 for CVE-2020-35496", url: "https://bugzilla.suse.com/1180454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35496", }, { cve: "CVE-2020-35507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35507", }, ], notes: [ { category: "general", text: "There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35507", url: "https://www.suse.com/security/cve/CVE-2020-35507", }, { category: "external", summary: "SUSE Bug 1180461 for CVE-2020-35507", url: "https://bugzilla.suse.com/1180461", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-35507", }, { cve: "CVE-2021-20197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20197", }, ], notes: [ { category: "general", text: "There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-20197", url: "https://www.suse.com/security/cve/CVE-2021-20197", }, { category: "external", summary: "SUSE Bug 1181452 for CVE-2021-20197", url: "https://bugzilla.suse.com/1181452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-20197", }, { cve: "CVE-2021-20284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20284", }, ], notes: [ { category: "general", text: "A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-20284", url: "https://www.suse.com/security/cve/CVE-2021-20284", }, { category: "external", summary: "SUSE Bug 1183511 for CVE-2021-20284", url: "https://bugzilla.suse.com/1183511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-20284", }, { cve: "CVE-2021-3487", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3487", }, ], notes: [ { category: "general", text: "** REJECT ** Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3487", url: "https://www.suse.com/security/cve/CVE-2021-3487", }, { category: "external", summary: "SUSE Bug 1184620 for CVE-2021-3487", url: "https://bugzilla.suse.com/1184620", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.37-1.3.x86_64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.aarch64", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.s390x", "openSUSE Tumbleweed:binutils-gold-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.37-1.3.x86_64", "openSUSE Tumbleweed:libctf0-2.37-1.3.aarch64", "openSUSE Tumbleweed:libctf0-2.37-1.3.ppc64le", "openSUSE Tumbleweed:libctf0-2.37-1.3.s390x", "openSUSE Tumbleweed:libctf0-2.37-1.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3487", }, ], }
opensuse-su-2024:12745-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
gdb-12.1-6.1 on GA media
Notes
Title of the patch
gdb-12.1-6.1 on GA media
Description of the patch
These are all security issues fixed in the gdb-12.1-6.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12745
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "gdb-12.1-6.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the gdb-12.1-6.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12745", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12745-1.json", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, ], title: "gdb-12.1-6.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12745-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gdb-12.1-6.1.aarch64", product: { name: "gdb-12.1-6.1.aarch64", product_id: "gdb-12.1-6.1.aarch64", }, }, { category: "product_version", name: "gdbserver-12.1-6.1.aarch64", product: { name: "gdbserver-12.1-6.1.aarch64", product_id: "gdbserver-12.1-6.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gdb-12.1-6.1.ppc64le", product: { name: "gdb-12.1-6.1.ppc64le", product_id: "gdb-12.1-6.1.ppc64le", }, }, { category: "product_version", name: "gdbserver-12.1-6.1.ppc64le", product: { name: "gdbserver-12.1-6.1.ppc64le", product_id: "gdbserver-12.1-6.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gdb-12.1-6.1.s390x", product: { name: "gdb-12.1-6.1.s390x", product_id: "gdb-12.1-6.1.s390x", }, }, { category: "product_version", name: "gdbserver-12.1-6.1.s390x", product: { name: "gdbserver-12.1-6.1.s390x", product_id: "gdbserver-12.1-6.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gdb-12.1-6.1.x86_64", product: { name: "gdb-12.1-6.1.x86_64", product_id: "gdb-12.1-6.1.x86_64", }, }, { category: "product_version", name: "gdbserver-12.1-6.1.x86_64", product: { name: "gdbserver-12.1-6.1.x86_64", product_id: "gdbserver-12.1-6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gdb-12.1-6.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", }, product_reference: "gdb-12.1-6.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-6.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", }, product_reference: "gdb-12.1-6.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-6.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", }, product_reference: "gdb-12.1-6.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-6.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", }, product_reference: "gdb-12.1-6.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-6.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", }, product_reference: "gdbserver-12.1-6.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-6.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", }, product_reference: "gdbserver-12.1-6.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-6.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", }, product_reference: "gdbserver-12.1-6.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-6.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", }, product_reference: "gdbserver-12.1-6.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:gdb-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdb-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdb-12.1-6.1.s390x", "openSUSE Tumbleweed:gdb-12.1-6.1.x86_64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.aarch64", "openSUSE Tumbleweed:gdbserver-12.1-6.1.ppc64le", "openSUSE Tumbleweed:gdbserver-12.1-6.1.s390x", "openSUSE Tumbleweed:gdbserver-12.1-6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-7208", }, ], }
WID-SEC-W-2024-3377
Vulnerability from csaf_certbund
Published
2024-11-07 23:00
Modified
2024-11-07 23:00
Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3377 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json", }, { category: "self", summary: "WID-SEC-2024-3377 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377", }, { category: "external", summary: "Dell Security Update", url: "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability", }, ], source_lang: "en-US", title: "Dell PowerProtect Data Domain: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-07T23:00:00.000+00:00", generator: { date: "2024-11-08T12:08:33.588+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-3377", initial_release_date: "2024-11-07T23:00:00.000+00:00", revision_history: [ { date: "2024-11-07T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<8.1.0.0", product: { name: "Dell PowerProtect Data Domain <8.1.0.0", product_id: "T038861", }, }, { category: "product_version", name: "8.1.0.0", product: { name: "Dell PowerProtect Data Domain 8.1.0.0", product_id: "T038861-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:8.1.0.0", }, }, }, { category: "product_version_range", name: "<7.13.1.10", product: { name: "Dell PowerProtect Data Domain <7.13.1.10", product_id: "T038862", }, }, { category: "product_version", name: "7.13.1.10", product: { name: "Dell PowerProtect Data Domain 7.13.1.10", product_id: "T038862-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.13.1.10", }, }, }, { category: "product_version_range", name: "<7.10.1.40", product: { name: "Dell PowerProtect Data Domain <7.10.1.40", product_id: "T038863", }, }, { category: "product_version", name: "7.10.1.40", product: { name: "Dell PowerProtect Data Domain 7.10.1.40", product_id: "T038863-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.10.1.40", }, }, }, { category: "product_version_range", name: "<7.7.5.50", product: { name: "Dell PowerProtect Data Domain <7.7.5.50", product_id: "T038864", }, }, { category: "product_version", name: "7.7.5.50", product: { name: "Dell PowerProtect Data Domain 7.7.5.50", product_id: "T038864-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.7.5.50", }, }, }, ], category: "product_name", name: "powerprotect_data_domain", }, ], category: "vendor", name: "dell", }, ], }, vulnerabilities: [ { cve: "CVE-2024-45759", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen unzureichender Privilegienbeschränkungen, die unautorisierte Konfigurationsänderungen ermöglichen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um bestimmte Befehle auszuführen, die Systemkonfiguration der Anwendung zu überschreiben und so seine Privilegien zu erhöhen oder einen Denial-of-Service-Zustand zu erzeugen. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-45759", }, { cve: "CVE-2024-48010", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen einer unsachgemäßen Zugriffskontrolle. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erhöhen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48010", }, { cve: "CVE-2024-48011", notes: [ { category: "description", text: "Es existiert eine nicht näher beschriebene Schwachstelle in Dell PowerProtect Data Domain. Ein entfernter, authentisierter Angreifer kann dadurch Informationen offenlegen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48011", }, { cve: "CVE-2017-16829", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-16829", }, { cve: "CVE-2017-5849", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-5849", }, { cve: "CVE-2018-7208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2018-7208", }, { cve: "CVE-2019-14889", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2019-14889", }, { cve: "CVE-2020-12912", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-12912", }, { cve: "CVE-2020-16135", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-16135", }, { cve: "CVE-2020-1730", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-1730", }, { cve: "CVE-2020-24455", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-24455", }, { cve: "CVE-2020-8694", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8694", }, { cve: "CVE-2020-8695", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8695", }, { cve: "CVE-2021-27219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-27219", }, { cve: "CVE-2021-3565", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3565", }, { cve: "CVE-2021-3634", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3634", }, { cve: "CVE-2022-1210", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1210", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1996", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1996", }, { cve: "CVE-2022-22576", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-22576", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-27774", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27774", }, { cve: "CVE-2022-27775", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27775", }, { cve: "CVE-2022-27776", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27776", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-29361", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-29361", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-40023", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40023", }, { cve: "CVE-2022-40090", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40090", }, { cve: "CVE-2022-42915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42915", }, { cve: "CVE-2022-42916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42916", }, { cve: "CVE-2022-43551", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43551", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-4603", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-4603", }, { cve: "CVE-2022-48064", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48064", }, { cve: "CVE-2022-48624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48624", }, { cve: "CVE-2023-0461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-0461", }, { cve: "CVE-2023-1667", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1667", }, { cve: "CVE-2023-1916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1916", }, { cve: "CVE-2023-20592", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-20592", }, { cve: "CVE-2023-2137", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2137", }, { cve: "CVE-2023-22745", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-22745", }, { cve: "CVE-2023-2283", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2283", }, { cve: "CVE-2023-23914", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23914", }, { cve: "CVE-2023-23915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23915", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23934", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23934", }, { cve: "CVE-2023-25577", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-25577", }, { cve: "CVE-2023-26965", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-26965", }, { cve: "CVE-2023-27043", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27043", }, { cve: "CVE-2023-2731", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2731", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-28319", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28319", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-31083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-31083", }, { cve: "CVE-2023-34055", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-34055", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-38286", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38286", }, { cve: "CVE-2023-38469", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38469", }, { cve: "CVE-2023-38471", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38471", }, { cve: "CVE-2023-38472", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38472", }, { cve: "CVE-2023-38545", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38545", }, { cve: "CVE-2023-38546", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38546", }, { cve: "CVE-2023-39197", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39198", }, { cve: "CVE-2023-39804", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39804", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-42465", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-42465", }, { cve: "CVE-2023-4255", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-4255", }, { cve: "CVE-2023-45139", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45139", }, { cve: "CVE-2023-45322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45322", }, { cve: "CVE-2023-45863", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45871", }, { cve: "CVE-2023-46136", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46136", }, { cve: "CVE-2023-46218", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46218", }, { cve: "CVE-2023-46219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46219", }, { cve: "CVE-2023-46751", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46751", }, { cve: "CVE-2023-48795", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-48795", }, { cve: "CVE-2023-49083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-49083", }, { cve: "CVE-2023-50447", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50447", }, { cve: "CVE-2023-5049", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5049", }, { cve: "CVE-2023-50495", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50495", }, { cve: "CVE-2023-50782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50782", }, { cve: "CVE-2023-51257", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-51257", }, { cve: "CVE-2023-52425", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52425", }, { cve: "CVE-2023-52426", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52426", }, { cve: "CVE-2023-5678", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5678", }, { cve: "CVE-2023-5717", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5717", }, { cve: "CVE-2023-5752", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5752", }, { cve: "CVE-2023-6004", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6004", }, { cve: "CVE-2023-6597", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6597", }, { cve: "CVE-2023-6918", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6918", }, { cve: "CVE-2023-7207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-7207", }, { cve: "CVE-2024-0450", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0450", }, { cve: "CVE-2024-0727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0727", }, { cve: "CVE-2024-0985", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0985", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-21626", }, { cve: "CVE-2024-22195", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22195", }, { cve: "CVE-2024-22365", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22365", }, { cve: "CVE-2024-23651", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23651", }, { cve: "CVE-2024-23652", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23652", }, { cve: "CVE-2024-23653", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23653", }, { cve: "CVE-2024-23672", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23672", }, { cve: "CVE-2024-24549", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-24549", }, { cve: "CVE-2024-25062", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-25062", }, { cve: "CVE-2024-26130", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26130", }, { cve: "CVE-2024-26458", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26458", }, { cve: "CVE-2024-26461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26461", }, { cve: "CVE-2024-28085", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28085", }, { cve: "CVE-2024-28182", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28182", }, { cve: "CVE-2024-28219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28219", }, { cve: "CVE-2024-28757", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28757", }, ], }
wid-sec-w-2024-3377
Vulnerability from csaf_certbund
Published
2024-11-07 23:00
Modified
2024-11-07 23:00
Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3377 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json", }, { category: "self", summary: "WID-SEC-2024-3377 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377", }, { category: "external", summary: "Dell Security Update", url: "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability", }, ], source_lang: "en-US", title: "Dell PowerProtect Data Domain: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-07T23:00:00.000+00:00", generator: { date: "2024-11-08T12:08:33.588+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-3377", initial_release_date: "2024-11-07T23:00:00.000+00:00", revision_history: [ { date: "2024-11-07T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<8.1.0.0", product: { name: "Dell PowerProtect Data Domain <8.1.0.0", product_id: "T038861", }, }, { category: "product_version", name: "8.1.0.0", product: { name: "Dell PowerProtect Data Domain 8.1.0.0", product_id: "T038861-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:8.1.0.0", }, }, }, { category: "product_version_range", name: "<7.13.1.10", product: { name: "Dell PowerProtect Data Domain <7.13.1.10", product_id: "T038862", }, }, { category: "product_version", name: "7.13.1.10", product: { name: "Dell PowerProtect Data Domain 7.13.1.10", product_id: "T038862-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.13.1.10", }, }, }, { category: "product_version_range", name: "<7.10.1.40", product: { name: "Dell PowerProtect Data Domain <7.10.1.40", product_id: "T038863", }, }, { category: "product_version", name: "7.10.1.40", product: { name: "Dell PowerProtect Data Domain 7.10.1.40", product_id: "T038863-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.10.1.40", }, }, }, { category: "product_version_range", name: "<7.7.5.50", product: { name: "Dell PowerProtect Data Domain <7.7.5.50", product_id: "T038864", }, }, { category: "product_version", name: "7.7.5.50", product: { name: "Dell PowerProtect Data Domain 7.7.5.50", product_id: "T038864-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.7.5.50", }, }, }, ], category: "product_name", name: "powerprotect_data_domain", }, ], category: "vendor", name: "dell", }, ], }, vulnerabilities: [ { cve: "CVE-2024-45759", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen unzureichender Privilegienbeschränkungen, die unautorisierte Konfigurationsänderungen ermöglichen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um bestimmte Befehle auszuführen, die Systemkonfiguration der Anwendung zu überschreiben und so seine Privilegien zu erhöhen oder einen Denial-of-Service-Zustand zu erzeugen. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-45759", }, { cve: "CVE-2024-48010", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen einer unsachgemäßen Zugriffskontrolle. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erhöhen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48010", }, { cve: "CVE-2024-48011", notes: [ { category: "description", text: "Es existiert eine nicht näher beschriebene Schwachstelle in Dell PowerProtect Data Domain. Ein entfernter, authentisierter Angreifer kann dadurch Informationen offenlegen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48011", }, { cve: "CVE-2017-16829", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-16829", }, { cve: "CVE-2017-5849", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-5849", }, { cve: "CVE-2018-7208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2018-7208", }, { cve: "CVE-2019-14889", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2019-14889", }, { cve: "CVE-2020-12912", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-12912", }, { cve: "CVE-2020-16135", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-16135", }, { cve: "CVE-2020-1730", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-1730", }, { cve: "CVE-2020-24455", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-24455", }, { cve: "CVE-2020-8694", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8694", }, { cve: "CVE-2020-8695", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8695", }, { cve: "CVE-2021-27219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-27219", }, { cve: "CVE-2021-3565", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3565", }, { cve: "CVE-2021-3634", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3634", }, { cve: "CVE-2022-1210", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1210", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1996", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1996", }, { cve: "CVE-2022-22576", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-22576", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-27774", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27774", }, { cve: "CVE-2022-27775", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27775", }, { cve: "CVE-2022-27776", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27776", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-29361", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-29361", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-40023", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40023", }, { cve: "CVE-2022-40090", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40090", }, { cve: "CVE-2022-42915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42915", }, { cve: "CVE-2022-42916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42916", }, { cve: "CVE-2022-43551", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43551", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-4603", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-4603", }, { cve: "CVE-2022-48064", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48064", }, { cve: "CVE-2022-48624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48624", }, { cve: "CVE-2023-0461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-0461", }, { cve: "CVE-2023-1667", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1667", }, { cve: "CVE-2023-1916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1916", }, { cve: "CVE-2023-20592", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-20592", }, { cve: "CVE-2023-2137", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2137", }, { cve: "CVE-2023-22745", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-22745", }, { cve: "CVE-2023-2283", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2283", }, { cve: "CVE-2023-23914", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23914", }, { cve: "CVE-2023-23915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23915", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23934", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23934", }, { cve: "CVE-2023-25577", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-25577", }, { cve: "CVE-2023-26965", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-26965", }, { cve: "CVE-2023-27043", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27043", }, { cve: "CVE-2023-2731", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2731", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-28319", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28319", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-31083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-31083", }, { cve: "CVE-2023-34055", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-34055", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-38286", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38286", }, { cve: "CVE-2023-38469", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38469", }, { cve: "CVE-2023-38471", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38471", }, { cve: "CVE-2023-38472", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38472", }, { cve: "CVE-2023-38545", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38545", }, { cve: "CVE-2023-38546", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38546", }, { cve: "CVE-2023-39197", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39198", }, { cve: "CVE-2023-39804", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39804", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-42465", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-42465", }, { cve: "CVE-2023-4255", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-4255", }, { cve: "CVE-2023-45139", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45139", }, { cve: "CVE-2023-45322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45322", }, { cve: "CVE-2023-45863", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45871", }, { cve: "CVE-2023-46136", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46136", }, { cve: "CVE-2023-46218", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46218", }, { cve: "CVE-2023-46219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46219", }, { cve: "CVE-2023-46751", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46751", }, { cve: "CVE-2023-48795", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-48795", }, { cve: "CVE-2023-49083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-49083", }, { cve: "CVE-2023-50447", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50447", }, { cve: "CVE-2023-5049", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5049", }, { cve: "CVE-2023-50495", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50495", }, { cve: "CVE-2023-50782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50782", }, { cve: "CVE-2023-51257", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-51257", }, { cve: "CVE-2023-52425", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52425", }, { cve: "CVE-2023-52426", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52426", }, { cve: "CVE-2023-5678", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5678", }, { cve: "CVE-2023-5717", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5717", }, { cve: "CVE-2023-5752", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5752", }, { cve: "CVE-2023-6004", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6004", }, { cve: "CVE-2023-6597", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6597", }, { cve: "CVE-2023-6918", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6918", }, { cve: "CVE-2023-7207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-7207", }, { cve: "CVE-2024-0450", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0450", }, { cve: "CVE-2024-0727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0727", }, { cve: "CVE-2024-0985", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0985", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-21626", }, { cve: "CVE-2024-22195", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22195", }, { cve: "CVE-2024-22365", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22365", }, { cve: "CVE-2024-23651", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23651", }, { cve: "CVE-2024-23652", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23652", }, { cve: "CVE-2024-23653", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23653", }, { cve: "CVE-2024-23672", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23672", }, { cve: "CVE-2024-24549", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-24549", }, { cve: "CVE-2024-25062", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-25062", }, { cve: "CVE-2024-26130", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26130", }, { cve: "CVE-2024-26458", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26458", }, { cve: "CVE-2024-26461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26461", }, { cve: "CVE-2024-28085", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28085", }, { cve: "CVE-2024-28182", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28182", }, { cve: "CVE-2024-28219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28219", }, { cve: "CVE-2024-28757", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28757", }, ], }
fkie_cve-2017-16829
Vulnerability from fkie_nvd
Published
2017-11-15 08:29
Modified
2025-04-20 01:37
Severity ?
Summary
The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", matchCriteriaId: "40A0A80E-11FE-4454-996C-9D4299602569", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", }, { lang: "es", value: "La función _bfd_elf_parse_gnu_properties en elf-properties.c en la biblioteca Binary File Descriptor (BFD), conocida como libbfd, tal y como se distribuye en GNU Binutils 2.29.1 no previene los punteros negativos, lo que permite que atacantes remotos provoquen una denegación de servicio (lectura fuera de límites y cierre inesperado de la aplicación) o, posiblemente, otro impacto sin especificar mediante un archivo ELF manipulado.", }, ], id: "CVE-2017-16829", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-15T08:29:00.437", references: [ { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201811-17", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Patch", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, { source: "cve@mitre.org", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201811-17", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-rpgg-426j-hqcx
Vulnerability from github
Published
2022-05-14 01:56
Modified
2025-04-20 03:48
Severity ?
Details
The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
{ affected: [], aliases: [ "CVE-2017-16829", ], database_specific: { cwe_ids: [ "CWE-125", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2017-11-15T08:29:00Z", severity: "HIGH", }, details: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", id: "GHSA-rpgg-426j-hqcx", modified: "2025-04-20T03:48:28Z", published: "2022-05-14T01:56:34Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-16829", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201811-17", }, { type: "WEB", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, { type: "WEB", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163", }, { type: "WEB", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2017-16829
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
Aliases
Aliases
{ GSD: { alias: "CVE-2017-16829", description: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", id: "GSD-2017-16829", references: [ "https://www.suse.com/security/cve/CVE-2017-16829.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2017-16829", ], details: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", id: "GSD-2017-16829", modified: "2023-12-13T01:21:01.203500Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-16829", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", refsource: "CONFIRM", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", }, { name: "GLSA-201811-17", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201811-17", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", refsource: "CONFIRM", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-16829", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", refsource: "CONFIRM", tags: [ "Patch", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163", }, { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", refsource: "CONFIRM", tags: [ "Exploit", "Issue Tracking", "Patch", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", }, { name: "GLSA-201811-17", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/201811-17", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2018-11-27T11:29Z", publishedDate: "2017-11-15T08:29Z", }, }, }
suse-su-2018:3207-2
Vulnerability from csaf_suse
Published
2018-10-18 12:51
Modified
2018-10-18 12:51
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils to 2.31 fixes the following issues:
These security issues were fixed:
- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
(excessive memory allocation) or possibly have unspecified other impact via a
crafted ELF file that triggered a buffer overflow on fuzzed archive header
(bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
NULL files in a .debug_line file table, which allowed remote attackers to cause
a denial of service (NULL pointer dereference and application crash) via a
crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
file, which allowed remote attackers to cause a denial of service
(find_abstract_instance_name invalid memory read, segmentation fault, and
application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (invalid memory access and application crash) or possibly have
unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
Descriptor (BFD) library (aka libbfd) did not validate size and offset values
in the data dictionary, which allowed remote attackers to cause a denial of
service (segmentation violation and application crash) or possibly have
unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
validate the symbol count, which allowed remote attackers to cause a denial of
service (integer overflow and application crash, or excessive memory
allocation) or possibly have unspecified other impact via a crafted PE file
(bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
integer-overflow protection on 32-bit platforms, which allowed remote attackers
to cause a denial of service (segmentation violation and application crash) or
possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
allowed remote attackers to cause a denial of service (out-of-bounds read and
application crash) or possibly have unspecified other impact via a crafted ELF
file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
cause a denial of service (integer overflow and heap-based buffer over-read,
and application crash) or possibly have unspecified other impact via a crafted
ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
denial of service (slurp_symtab invalid free and application crash) or possibly
have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
library (aka libbfd) had an unsigned integer overflow because bfd_size_type
multiplication is not used. A crafted ELF file allowed remote attackers to
cause a denial of service (application crash) or possibly have unspecified
other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
load_specific_debug_section() which resulted in `malloc()` with 0 size. A
crafted ELF file allowed remote attackers to cause a denial of service
(application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
Remote attackers could have leveraged this vulnerability to cause a denial of
service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (out-of-bounds read and segmentation violation) via a note with a large
alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
remote attackers to cause a denial of service (segmentation fault) or possibly
have unspecified other impact via a crafted file, as demonstrated by objcopy of
a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
to cause a denial of service (NULL pointer dereference and application crash)
via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
remote attackers to cause a denial of service (integer underflow or overflow,
and application crash) via an ELF file with a corrupt DWARF FORM block, as
demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
denial of service (segmentation fault) via a large attribute section
(bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
cause a denial of service (integer overflow and application crash) or possibly
have unspecified other impact via a crafted ELF file, as demonstrated by
objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (aout_32_swap_std_reloc_out NULL pointer dereference and application
crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
library (aka libbfd) allowed remote attackers to cause a denial of service
(integer overflow and application crash) via an ELF file with corrupt dwarf1
debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
(aka libbfd) allowed remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted binary file, as
demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
denial of service (heap-based buffer over-read and application crash) via a
crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
(BFD) library (aka libbfd) did not validate the output_section pointer in the
case of a symtab entry with a 'SECTION' type that has a '0' value, which
allowed remote attackers to cause a denial of service (NULL pointer dereference
and application crash) via a crafted file, as demonstrated by objcopy
(bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
Directory size with an unbounded loop that increased the value of
(external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
memory region, resulting in an out-of-bounds memory write, as demonstrated by
objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
in pex64igen.c (bsc#1091368).
These non-security issues were fixed:
- The AArch64 port now supports showing disassembly notes which are emitted
when inconsistencies are found with the instruction that may result in the
instruction being invalid. These can be turned on with the option -M notes
to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
now only set the bottom bit of the address of thumb function symbols
if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
Build Attribute notes if none are present in the input sources. Add a
--enable-generate-build-notes=[yes|no] configure time option to set the
default behaviour. Set the default if the configure option is not used
to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
shorter instruction encoding.
- Add support for .nops directive. It is currently supported only for
x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
-z separate-code should be enabled in ELF linker by default. Default
to yes for Linux/x86 targets. Note that -z separate-code can increase
disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
sections.
Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
option to objdump which causes indirect links into separate debug info files
to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
for every dynamic object loaded by an executable - provided that the loader
supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would
previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)
Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:
- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
case where the main file name and the directory name are both empty, triggering
a NULL pointer dereference and an invalid write, and leading to a program crash
(bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
invalid write (of size 1) while disassembling a corrupt binary that contains an
empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
(of size 1) while attempting to unget an EOF character from the input stream,
potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
(BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
size 4049 because it used the strlen function instead of strnlen, leading to
program crashes in several utilities such as addr2line, size, and strings. It
could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
function in bfd/elflink.c) did not check the format of the input file trying to
read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
heap-based buffer over-read (off-by-one) because of an incomplete check for
invalid string offsets while loading symbols, leading to a GNU linker (ld)
program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
read (of size 4) because of missing checks for relocs that could not be
recognised. This vulnerability caused Binutils utilities like strip to crash
(bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read (of size 4) because of missing a check (in the
find_link function) for null headers attempting to match them. This
vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
vulnerability because it did not carefully check the string offset. The
vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read (of size 8) because of missing a check (in the
copy_special_section_fields function) for an invalid sh_link field attempting
to follow it. This vulnerability caused Binutils utilities like strip to crash
(bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read of size 8 because of missing a check to determine
whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
vulnerability caused programs that conduct an analysis of binary programs using
the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to a global buffer over-read error because of an assumption made by
code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
named starting with a .rel/.rela prefix. This vulnerability caused programs
that conduct an analysis of binary programs using the libbfd library, such as
objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
_bfd_elf_large_com_section. This vulnerability caused programs that conduct an
analysis of binary programs using the libbfd library, such as objcopy, to crash
(bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read of size 1 because the existing reloc offset range
tests didn't catch small negative offsets less than the size of the reloc
field. This vulnerability caused programs that conduct an analysis of binary
programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
(BFD) library (aka libbfd) had a memory leak vulnerability which can cause
memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
attackers to cause a denial of service (buffer overflow and application crash)
or possibly have unspecified other impact via a crafted binary file, as
demonstrated by mishandling of rae insns printing for this file during 'objdump
-D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
(BFD) library (aka libbfd) might have allowed remote attackers to cause a
denial of service (buffer overflow and application crash) or possibly have
unspecified other impact via a crafted binary file, as demonstrated by
mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
library (aka libbfd) might have allowed remote attackers to cause a denial of
service (buffer overflow and application crash) or possibly have unspecified
other impact via a crafted binary file, as demonstrated by mishandling of this
file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
arrays, which allowed remote attackers to cause a denial of service (buffer
overflow and application crash) or possibly have unspecified other impact via a
crafted binary file, as demonstrated by mishandling of this file during
'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
allowed remote attackers to cause a denial of service (buffer overflow and
application crash) or possibly have unspecified other impact via a crafted
binary file, as demonstrated by mishandling of this file during 'objdump -D'
execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
to cause a denial of service (buffer overflow and application crash) or
possibly have unspecified other impact via a crafted binary file, as
demonstrated by mishandling of this file during 'objdump -D' execution
(bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
pointer while reading section contents in a corrupt binary, leading to a
program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
input files containing symbol-difference relocations, leading to a heap-based
buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
error while processing multiple, relocated sections in an MSP430 binary. This
is caused by mishandling of an invalid symbol index, and mishandling of state
across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
processing corrupt RL78 binaries. The vulnerability can trigger program
crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
over-reads (of size 1 and size 8) while handling corrupt STABS enum type
strings in a crafted object file, leading to program crash (bsc#1030297).
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-2297
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils to 2.31 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service\n (excessive memory allocation) or possibly have unspecified other impact via a\n crafted ELF file that triggered a buffer overflow on fuzzed archive header\n (bsc#1065643).\n- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled\n NULL files in a .debug_line file table, which allowed remote attackers to cause\n a denial of service (NULL pointer dereference and application crash) via a\n crafted ELF file, related to concat_filename (bsc#1065689).\n- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)\n miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object\n file, which allowed remote attackers to cause a denial of service\n (find_abstract_instance_name invalid memory read, segmentation fault, and\n application crash) (bsc#1065693).\n- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (invalid memory access and application crash) or possibly have\n unspecified other impact via a crafted PE file (bsc#1068640).\n- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File\n Descriptor (BFD) library (aka libbfd) did not validate size and offset values\n in the data dictionary, which allowed remote attackers to cause a denial of\n service (segmentation violation and application crash) or possibly have\n unspecified other impact via a crafted PE file (bsc#1068643).\n- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not\n validate the symbol count, which allowed remote attackers to cause a denial of\n service (integer overflow and application crash, or excessive memory\n allocation) or possibly have unspecified other impact via a crafted PE file\n (bsc#1068887).\n- CVE-2017-16830: The print_gnu_property_note function did not have\n integer-overflow protection on 32-bit platforms, which allowed remote attackers\n to cause a denial of service (segmentation violation and application crash) or\n possibly have unspecified other impact via a crafted ELF file (bsc#1068888).\n- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File\n Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which\n allowed remote attackers to cause a denial of service (out-of-bounds read and\n application crash) or possibly have unspecified other impact via a crafted ELF\n file (bsc#1068950).\n- CVE-2017-16828: The display_debug_frames function allowed remote attackers to\n cause a denial of service (integer overflow and heap-based buffer over-read,\n and application crash) or possibly have unspecified other impact via a crafted\n ELF file (bsc#1069176).\n- CVE-2017-16827: The aout_get_external_symbols function in the Binary File\n Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a\n denial of service (slurp_symtab invalid free and application crash) or possibly\n have unspecified other impact via a crafted ELF file (bsc#1069202).\n- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)\n library (aka libbfd) had an unsigned integer overflow because bfd_size_type\n multiplication is not used. A crafted ELF file allowed remote attackers to\n cause a denial of service (application crash) or possibly have unspecified\n other impact (bsc#1077745).\n- CVE-2018-6543: Prevent integer overflow in the function\n load_specific_debug_section() which resulted in `malloc()` with 0 size. A\n crafted ELF file allowed remote attackers to cause a denial of service\n (application crash) or possibly have unspecified other impact (bsc#1079103).\n- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File\n Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.\n Remote attackers could have leveraged this vulnerability to cause a denial of\n service (segmentation fault) via a crafted ELF file (bsc#1079741).\n- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (out-of-bounds read and segmentation violation) via a note with a large\n alignment (bsc#1080556).\n- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File\n Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed\n remote attackers to cause a denial of service (segmentation fault) or possibly\n have unspecified other impact via a crafted file, as demonstrated by objcopy of\n a COFF object (bsc#1081527).\n- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in\n the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers\n to cause a denial of service (NULL pointer dereference and application crash)\n via an ELF file with a RELRO segment that lacks a matching LOAD segment, as\n demonstrated by objcopy (bsc#1083528).\n- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed\n remote attackers to cause a denial of service (integer underflow or overflow,\n and application crash) via an ELF file with a corrupt DWARF FORM block, as\n demonstrated by nm (bsc#1083532).\n- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File\n Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a\n denial of service (segmentation fault) via a large attribute section\n (bsc#1086608).\n- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to\n cause a denial of service (integer overflow and application crash) or possibly\n have unspecified other impact via a crafted ELF file, as demonstrated by\n objdump (bsc#1086784).\n- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (aout_32_swap_std_reloc_out NULL pointer dereference and application\n crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).\n- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)\n library (aka libbfd) allowed remote attackers to cause a denial of service\n (integer overflow and application crash) via an ELF file with corrupt dwarf1\n debug information, as demonstrated by nm (bsc#1086788).\n- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library\n (aka libbfd) allowed remote attackers to cause a denial of service (NULL\n pointer dereference and application crash) via a crafted binary file, as\n demonstrated by nm-new (bsc#1090997).\n- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a\n denial of service (heap-based buffer over-read and application crash) via a\n crafted binary file, as demonstrated by readelf (bsc#1091015).\n- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor\n (BFD) library (aka libbfd) did not validate the output_section pointer in the\n case of a symtab entry with a 'SECTION' type that has a '0' value, which\n allowed remote attackers to cause a denial of service (NULL pointer dereference\n and application crash) via a crafted file, as demonstrated by objcopy\n (bsc#1091365).\n- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the\n Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data\n Directory size with an unbounded loop that increased the value of\n (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own\n memory region, resulting in an out-of-bounds memory write, as demonstrated by\n objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common\n in pex64igen.c (bsc#1091368).\n\nThese non-security issues were fixed:\n\n- The AArch64 port now supports showing disassembly notes which are emitted\n when inconsistencies are found with the instruction that may result in the\n instruction being invalid. These can be turned on with the option -M notes\n to objdump.\n- The AArch64 port now emits warnings when a combination of an instruction and\n a named register could be invalid.\n- Added O modifier to ar to display member offsets inside an archive\n- The ADR and ADRL pseudo-instructions supported by the ARM assembler\n now only set the bottom bit of the address of thumb function symbols\n if the -mthumb-interwork command line option is active.\n- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU\n Build Attribute notes if none are present in the input sources. Add a\n --enable-generate-build-notes=[yes|no] configure time option to set the\n default behaviour. Set the default if the configure option is not used\n to 'no'.\n- Remove -mold-gcc command-line option for x86 targets.\n- Add -O[2|s] command-line options to x86 assembler to enable alternate\n shorter instruction encoding.\n- Add support for .nops directive. It is currently supported only for\n x86 targets.\n- Speed up direct linking with DLLs for Cygwin and Mingw targets.\n- Add a configure option --enable-separate-code to decide whether\n -z separate-code should be enabled in ELF linker by default. Default\n to yes for Linux/x86 targets. Note that -z separate-code can increase\n disk and memory size.\n- RISC-V: Fix symbol address problem with versioned symbols \n- Restore riscv64-elf cross prefix via symlinks\n- RISC-V: Don't enable relaxation in relocatable link\n- Prevent linking faiures on i386 with assertion (bsc#1085784)\n- Fix symbol size bug when relaxation deletes bytes\n- Add --debug-dump=links option to readelf and --dwarf=links option to objdump\n which displays the contents of any .gnu_debuglink or .gnu_debugaltlink\n sections.\n Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links\n option to objdump which causes indirect links into separate debug info files\n to be followed when dumping other DWARF sections.\n- Add support for loaction views in DWARF debug line information.\n- Add -z separate-code to generate separate code PT_LOAD segment.\n- Add '-z undefs' command line option as the inverse of the '-z defs' option.\n- Add -z globalaudit command line option to force audit libraries to be run\n for every dynamic object loaded by an executable - provided that the loader\n supports this functionality.\n- Tighten linker script grammar around file name specifiers to prevent the use\n of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would\n previously be accepted but had no effect.\n- The EXCLUDE_FILE directive can now be placed within any SORT_* directive\n within input section lists.\n- Fix linker relaxation with --wrap\n- Add arm-none-eabi symlinks (bsc#1074741)\n\nFormer updates of binutils also fixed the following security issues, for which\nthere was not CVE assigned at the time the update was released or no mapping\nbetween code change and CVE existed:\n\n- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel\n Hex objects (bsc#1030296).\n- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the\n case where the main file name and the directory name are both empty, triggering\n a NULL pointer dereference and an invalid write, and leading to a program crash\n (bsc#1030585).\n- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an\n invalid write (of size 1) while disassembling a corrupt binary that contains an\n empty function name, leading to a program crash (bsc#1030588).\n- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow\n (of size 1) while attempting to unget an EOF character from the input stream,\n potentially leading to a program crash (bsc#1030589).\n- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor\n (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of\n size 4049 because it used the strlen function instead of strnlen, leading to\n program crashes in several utilities such as addr2line, size, and strings. It\n could lead to information disclosure as well (bsc#1030584).\n- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an\n invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link\n function in bfd/elflink.c) did not check the format of the input file trying to\n read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)\n program crash (bsc#1031644).\n- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an\n aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a\n heap-based buffer over-read (off-by-one) because of an incomplete check for\n invalid string offsets while loading symbols, leading to a GNU linker (ld)\n program crash (bsc#1031656).\n- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a\n swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid\n read (of size 4) because of missing checks for relocs that could not be\n recognised. This vulnerability caused Binutils utilities like strip to crash\n (bsc#1031595).\n- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read (of size 4) because of missing a check (in the\n find_link function) for null headers attempting to match them. This\n vulnerability caused Binutils utilities like strip to crash (bsc#1031593).\n- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an\n aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one\n vulnerability because it did not carefully check the string offset. The\n vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).\n- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read (of size 8) because of missing a check (in the\n copy_special_section_fields function) for an invalid sh_link field attempting\n to follow it. This vulnerability caused Binutils utilities like strip to crash\n (bsc#1031590).\n- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read of size 8 because of missing a check to determine\n whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This\n vulnerability caused programs that conduct an analysis of binary programs using\n the libbfd library, such as objdump, to crash (bsc#1037052).\n- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to a global buffer over-read error because of an assumption made by\n code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always\n named starting with a .rel/.rela prefix. This vulnerability caused programs\n that conduct an analysis of binary programs using the libbfd library, such as\n objcopy and strip, to crash (bsc#1037057).\n- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of\n _bfd_elf_large_com_section. This vulnerability caused programs that conduct an\n analysis of binary programs using the libbfd library, such as objcopy, to crash\n (bsc#1037061).\n- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read of size 1 because the existing reloc offset range\n tests didn't catch small negative offsets less than the size of the reloc\n field. This vulnerability caused programs that conduct an analysis of binary\n programs using the libbfd library, such as objdump, to crash (bsc#1037066).\n- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor\n (BFD) library (aka libbfd) had a memory leak vulnerability which can cause\n memory exhaustion in objdump via a crafted PE file (bsc#1037273).\n- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote\n attackers to cause a denial of service (buffer overflow and application crash)\n or possibly have unspecified other impact via a crafted binary file, as\n demonstrated by mishandling of rae insns printing for this file during 'objdump\n -D' execution (bsc#1044891).\n- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor\n (BFD) library (aka libbfd) might have allowed remote attackers to cause a\n denial of service (buffer overflow and application crash) or possibly have\n unspecified other impact via a crafted binary file, as demonstrated by\n mishandling of this file during 'objdump -D' execution (bsc#1044897).\n- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)\n library (aka libbfd) might have allowed remote attackers to cause a denial of\n service (buffer overflow and application crash) or possibly have unspecified\n other impact via a crafted binary file, as demonstrated by mishandling of this\n file during 'objdump -D' execution (bsc#1044901).\n- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale\n arrays, which allowed remote attackers to cause a denial of service (buffer\n overflow and application crash) or possibly have unspecified other impact via a\n crafted binary file, as demonstrated by mishandling of this file during\n 'objdump -D' execution (bsc#1044909).\n- CVE-2017-9755: Not considering the the number of registers for bnd mode\n allowed remote attackers to cause a denial of service (buffer overflow and\n application crash) or possibly have unspecified other impact via a crafted\n binary file, as demonstrated by mishandling of this file during 'objdump -D'\n execution (bsc#1044925).\n- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers\n to cause a denial of service (buffer overflow and application crash) or\n possibly have unspecified other impact via a crafted binary file, as\n demonstrated by mishandling of this file during 'objdump -D' execution\n (bsc#1044927).\n- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL\n pointer while reading section contents in a corrupt binary, leading to a\n program crash (bsc#1030298).\n- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt\n input files containing symbol-difference relocations, leading to a heap-based\n buffer overflow (bsc#1029909).\n- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)\n error while processing multiple, relocated sections in an MSP430 binary. This\n is caused by mishandling of an invalid symbol index, and mishandling of state\n across invocations (bsc#1029908).\n- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while\n processing corrupt RL78 binaries. The vulnerability can trigger program\n crashes. It may lead to an information leak as well (bsc#1029907).\n- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer\n over-reads (of size 1 and size 8) while handling corrupt STABS enum type\n strings in a crafted object file, leading to program crash (bsc#1030297).\n ", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SERVER-12-SP2-BCL-2018-2297", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3207-2.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3207-2", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183207-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3207-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html", }, { category: "self", summary: "SUSE Bug 1029907", url: "https://bugzilla.suse.com/1029907", }, { category: "self", summary: "SUSE Bug 1029908", url: "https://bugzilla.suse.com/1029908", }, { category: "self", summary: "SUSE Bug 1029909", url: "https://bugzilla.suse.com/1029909", }, { category: "self", summary: "SUSE Bug 1030296", url: "https://bugzilla.suse.com/1030296", }, { category: "self", summary: "SUSE Bug 1030297", url: "https://bugzilla.suse.com/1030297", }, { category: "self", summary: "SUSE Bug 1030298", url: "https://bugzilla.suse.com/1030298", }, { category: "self", summary: "SUSE Bug 1030584", url: "https://bugzilla.suse.com/1030584", }, { category: "self", summary: "SUSE Bug 1030585", url: "https://bugzilla.suse.com/1030585", }, { category: "self", summary: "SUSE Bug 1030588", url: "https://bugzilla.suse.com/1030588", }, { category: "self", summary: "SUSE Bug 1030589", url: "https://bugzilla.suse.com/1030589", }, { category: "self", summary: "SUSE Bug 1031590", url: "https://bugzilla.suse.com/1031590", }, { category: "self", summary: "SUSE Bug 1031593", url: "https://bugzilla.suse.com/1031593", }, { category: "self", summary: "SUSE Bug 1031595", url: "https://bugzilla.suse.com/1031595", }, { category: "self", summary: "SUSE Bug 1031638", url: "https://bugzilla.suse.com/1031638", }, { category: "self", summary: "SUSE Bug 1031644", url: "https://bugzilla.suse.com/1031644", }, { category: "self", summary: "SUSE Bug 1031656", url: "https://bugzilla.suse.com/1031656", }, { category: "self", summary: "SUSE Bug 1037052", url: "https://bugzilla.suse.com/1037052", }, { category: "self", summary: "SUSE Bug 1037057", url: "https://bugzilla.suse.com/1037057", }, { category: "self", summary: "SUSE Bug 1037061", url: "https://bugzilla.suse.com/1037061", }, { category: "self", summary: "SUSE Bug 1037066", url: "https://bugzilla.suse.com/1037066", }, { category: "self", summary: "SUSE Bug 1037273", url: "https://bugzilla.suse.com/1037273", }, { category: "self", summary: "SUSE Bug 1044891", url: "https://bugzilla.suse.com/1044891", }, { category: "self", summary: "SUSE Bug 1044897", url: "https://bugzilla.suse.com/1044897", }, { category: "self", summary: "SUSE Bug 1044901", url: "https://bugzilla.suse.com/1044901", }, { category: "self", summary: "SUSE Bug 1044909", url: "https://bugzilla.suse.com/1044909", }, { category: "self", summary: "SUSE Bug 1044925", url: "https://bugzilla.suse.com/1044925", }, { category: "self", summary: "SUSE Bug 1044927", url: "https://bugzilla.suse.com/1044927", }, { category: "self", summary: "SUSE Bug 1065643", url: "https://bugzilla.suse.com/1065643", }, { category: "self", summary: "SUSE Bug 1065689", url: "https://bugzilla.suse.com/1065689", }, { category: "self", summary: "SUSE Bug 1065693", url: "https://bugzilla.suse.com/1065693", }, { category: "self", summary: "SUSE Bug 1068640", url: "https://bugzilla.suse.com/1068640", }, { category: "self", summary: "SUSE Bug 1068643", url: "https://bugzilla.suse.com/1068643", }, { category: "self", summary: "SUSE Bug 1068887", url: "https://bugzilla.suse.com/1068887", }, { category: "self", summary: "SUSE Bug 1068888", url: "https://bugzilla.suse.com/1068888", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1069176", url: "https://bugzilla.suse.com/1069176", }, { category: "self", summary: "SUSE Bug 1069202", url: "https://bugzilla.suse.com/1069202", }, { category: "self", summary: "SUSE Bug 1074741", url: "https://bugzilla.suse.com/1074741", }, { category: "self", summary: "SUSE Bug 1077745", url: "https://bugzilla.suse.com/1077745", }, { category: "self", summary: "SUSE Bug 1079103", url: "https://bugzilla.suse.com/1079103", }, { category: "self", summary: "SUSE Bug 1079741", url: "https://bugzilla.suse.com/1079741", }, { category: "self", summary: "SUSE Bug 1080556", url: "https://bugzilla.suse.com/1080556", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1083528", url: "https://bugzilla.suse.com/1083528", }, { category: "self", summary: "SUSE Bug 1083532", url: "https://bugzilla.suse.com/1083532", }, { category: "self", summary: "SUSE Bug 1085784", url: "https://bugzilla.suse.com/1085784", }, { category: "self", summary: "SUSE Bug 1086608", url: "https://bugzilla.suse.com/1086608", }, { category: "self", summary: "SUSE Bug 1086784", url: "https://bugzilla.suse.com/1086784", }, { category: "self", summary: "SUSE Bug 1086786", url: "https://bugzilla.suse.com/1086786", }, { category: "self", summary: "SUSE Bug 1086788", url: "https://bugzilla.suse.com/1086788", }, { category: "self", summary: "SUSE Bug 1090997", url: "https://bugzilla.suse.com/1090997", }, { category: "self", summary: "SUSE Bug 1091015", url: "https://bugzilla.suse.com/1091015", }, { category: "self", summary: "SUSE Bug 1091365", url: "https://bugzilla.suse.com/1091365", }, { category: "self", summary: "SUSE Bug 1091368", url: "https://bugzilla.suse.com/1091368", }, { category: "self", summary: "SUSE CVE CVE-2014-9939 page", url: "https://www.suse.com/security/cve/CVE-2014-9939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15938 page", url: "https://www.suse.com/security/cve/CVE-2017-15938/", }, { category: "self", summary: "SUSE CVE CVE-2017-15939 page", url: "https://www.suse.com/security/cve/CVE-2017-15939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15996 page", url: "https://www.suse.com/security/cve/CVE-2017-15996/", }, { category: "self", summary: "SUSE CVE CVE-2017-16826 page", url: "https://www.suse.com/security/cve/CVE-2017-16826/", }, { category: "self", summary: "SUSE CVE CVE-2017-16827 page", url: "https://www.suse.com/security/cve/CVE-2017-16827/", }, { category: "self", summary: "SUSE CVE CVE-2017-16828 page", url: "https://www.suse.com/security/cve/CVE-2017-16828/", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2017-16830 page", url: "https://www.suse.com/security/cve/CVE-2017-16830/", }, { category: "self", summary: "SUSE CVE CVE-2017-16831 page", url: "https://www.suse.com/security/cve/CVE-2017-16831/", }, { category: "self", summary: "SUSE CVE CVE-2017-16832 page", url: "https://www.suse.com/security/cve/CVE-2017-16832/", }, { category: "self", summary: "SUSE CVE CVE-2017-6965 page", url: "https://www.suse.com/security/cve/CVE-2017-6965/", }, { category: "self", summary: "SUSE CVE CVE-2017-6966 page", url: "https://www.suse.com/security/cve/CVE-2017-6966/", }, { category: "self", summary: "SUSE CVE CVE-2017-6969 page", url: "https://www.suse.com/security/cve/CVE-2017-6969/", }, { category: "self", summary: "SUSE CVE CVE-2017-7209 page", url: "https://www.suse.com/security/cve/CVE-2017-7209/", }, { category: "self", summary: "SUSE CVE CVE-2017-7210 page", url: "https://www.suse.com/security/cve/CVE-2017-7210/", }, { category: "self", summary: "SUSE CVE CVE-2017-7223 page", url: "https://www.suse.com/security/cve/CVE-2017-7223/", }, { category: "self", summary: "SUSE CVE CVE-2017-7224 page", url: "https://www.suse.com/security/cve/CVE-2017-7224/", }, { category: "self", summary: "SUSE CVE CVE-2017-7225 page", url: "https://www.suse.com/security/cve/CVE-2017-7225/", }, { category: "self", summary: "SUSE CVE CVE-2017-7226 page", url: "https://www.suse.com/security/cve/CVE-2017-7226/", }, { category: "self", summary: "SUSE CVE CVE-2017-7299 page", url: "https://www.suse.com/security/cve/CVE-2017-7299/", }, { category: "self", summary: "SUSE CVE CVE-2017-7300 page", url: "https://www.suse.com/security/cve/CVE-2017-7300/", }, { category: "self", summary: "SUSE CVE CVE-2017-7301 page", url: "https://www.suse.com/security/cve/CVE-2017-7301/", }, { category: "self", summary: "SUSE CVE CVE-2017-7302 page", url: "https://www.suse.com/security/cve/CVE-2017-7302/", }, { category: "self", summary: "SUSE CVE CVE-2017-7303 page", url: "https://www.suse.com/security/cve/CVE-2017-7303/", }, { category: "self", summary: "SUSE CVE CVE-2017-7304 page", url: "https://www.suse.com/security/cve/CVE-2017-7304/", }, { category: "self", summary: "SUSE CVE CVE-2017-8392 page", url: "https://www.suse.com/security/cve/CVE-2017-8392/", }, { category: "self", summary: "SUSE CVE CVE-2017-8393 page", url: "https://www.suse.com/security/cve/CVE-2017-8393/", }, { category: "self", summary: "SUSE CVE CVE-2017-8394 page", url: "https://www.suse.com/security/cve/CVE-2017-8394/", }, { category: "self", summary: "SUSE CVE CVE-2017-8396 page", url: "https://www.suse.com/security/cve/CVE-2017-8396/", }, { category: "self", summary: "SUSE CVE CVE-2017-8421 page", url: "https://www.suse.com/security/cve/CVE-2017-8421/", }, { category: "self", summary: "SUSE CVE CVE-2017-9746 page", url: "https://www.suse.com/security/cve/CVE-2017-9746/", }, { category: "self", summary: "SUSE CVE CVE-2017-9747 page", url: "https://www.suse.com/security/cve/CVE-2017-9747/", }, { category: "self", summary: "SUSE CVE CVE-2017-9748 page", url: "https://www.suse.com/security/cve/CVE-2017-9748/", }, { category: "self", summary: "SUSE CVE CVE-2017-9750 page", url: "https://www.suse.com/security/cve/CVE-2017-9750/", }, { category: "self", summary: "SUSE CVE CVE-2017-9755 page", url: "https://www.suse.com/security/cve/CVE-2017-9755/", }, { category: "self", summary: "SUSE CVE CVE-2017-9756 page", url: "https://www.suse.com/security/cve/CVE-2017-9756/", }, { category: "self", summary: "SUSE CVE CVE-2018-10372 page", url: "https://www.suse.com/security/cve/CVE-2018-10372/", }, { category: "self", summary: "SUSE CVE CVE-2018-10373 page", url: "https://www.suse.com/security/cve/CVE-2018-10373/", }, { category: "self", summary: "SUSE CVE CVE-2018-10534 page", url: "https://www.suse.com/security/cve/CVE-2018-10534/", }, { category: "self", summary: "SUSE CVE CVE-2018-10535 page", url: "https://www.suse.com/security/cve/CVE-2018-10535/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2018-10-18T12:51:00Z", generator: { date: "2018-10-18T12:51:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3207-2", initial_release_date: "2018-10-18T12:51:00Z", revision_history: [ { date: "2018-10-18T12:51:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.31-9.26.1.x86_64", product: { name: "binutils-2.31-9.26.1.x86_64", product_id: "binutils-2.31-9.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9939", }, ], notes: [ { category: "general", text: "ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9939", url: "https://www.suse.com/security/cve/CVE-2014-9939", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2014-9939", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2014-9939", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2014-9939", }, { cve: "CVE-2017-15938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15938", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15938", url: "https://www.suse.com/security/cve/CVE-2017-15938", }, { category: "external", summary: "SUSE Bug 1065693 for CVE-2017-15938", url: "https://bugzilla.suse.com/1065693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-15938", }, { cve: "CVE-2017-15939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15939", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15939", url: "https://www.suse.com/security/cve/CVE-2017-15939", }, { category: "external", summary: "SUSE Bug 1061623 for CVE-2017-15939", url: "https://bugzilla.suse.com/1061623", }, { category: "external", summary: "SUSE Bug 1065689 for CVE-2017-15939", url: "https://bugzilla.suse.com/1065689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-15939", }, { cve: "CVE-2017-15996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15996", }, ], notes: [ { category: "general", text: "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15996", url: "https://www.suse.com/security/cve/CVE-2017-15996", }, { category: "external", summary: "SUSE Bug 1065643 for CVE-2017-15996", url: "https://bugzilla.suse.com/1065643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-15996", }, { cve: "CVE-2017-16826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16826", }, ], notes: [ { category: "general", text: "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16826", url: "https://www.suse.com/security/cve/CVE-2017-16826", }, { category: "external", summary: "SUSE Bug 1068640 for CVE-2017-16826", url: "https://bugzilla.suse.com/1068640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-16826", }, { cve: "CVE-2017-16827", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16827", }, ], notes: [ { category: "general", text: "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16827", url: "https://www.suse.com/security/cve/CVE-2017-16827", }, { category: "external", summary: "SUSE Bug 1069202 for CVE-2017-16827", url: "https://bugzilla.suse.com/1069202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-16827", }, { cve: "CVE-2017-16828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16828", }, ], notes: [ { category: "general", text: "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16828", url: "https://www.suse.com/security/cve/CVE-2017-16828", }, { category: "external", summary: "SUSE Bug 1069176 for CVE-2017-16828", url: "https://bugzilla.suse.com/1069176", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-16828", }, { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2017-16830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16830", }, ], notes: [ { category: "general", text: "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16830", url: "https://www.suse.com/security/cve/CVE-2017-16830", }, { category: "external", summary: "SUSE Bug 1068888 for CVE-2017-16830", url: "https://bugzilla.suse.com/1068888", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-16830", }, { cve: "CVE-2017-16831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16831", }, ], notes: [ { category: "general", text: "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16831", url: "https://www.suse.com/security/cve/CVE-2017-16831", }, { category: "external", summary: "SUSE Bug 1068887 for CVE-2017-16831", url: "https://bugzilla.suse.com/1068887", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-16831", }, { cve: "CVE-2017-16832", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16832", }, ], notes: [ { category: "general", text: "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16832", url: "https://www.suse.com/security/cve/CVE-2017-16832", }, { category: "external", summary: "SUSE Bug 1068643 for CVE-2017-16832", url: "https://bugzilla.suse.com/1068643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-16832", }, { cve: "CVE-2017-6965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6965", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6965", url: "https://www.suse.com/security/cve/CVE-2017-6965", }, { category: "external", summary: "SUSE Bug 1029909 for CVE-2017-6965", url: "https://bugzilla.suse.com/1029909", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-6965", }, { cve: "CVE-2017-6966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6966", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6966", url: "https://www.suse.com/security/cve/CVE-2017-6966", }, { category: "external", summary: "SUSE Bug 1029908 for CVE-2017-6966", url: "https://bugzilla.suse.com/1029908", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-6966", }, { cve: "CVE-2017-6969", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6969", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6969", url: "https://www.suse.com/security/cve/CVE-2017-6969", }, { category: "external", summary: "SUSE Bug 1029907 for CVE-2017-6969", url: "https://bugzilla.suse.com/1029907", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-6969", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "critical", }, ], title: "CVE-2017-6969", }, { cve: "CVE-2017-7209", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7209", }, ], notes: [ { category: "general", text: "The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7209", url: "https://www.suse.com/security/cve/CVE-2017-7209", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030298 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-7209", }, { cve: "CVE-2017-7210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7210", }, ], notes: [ { category: "general", text: "objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7210", url: "https://www.suse.com/security/cve/CVE-2017-7210", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030297 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-7210", }, { cve: "CVE-2017-7223", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7223", }, ], notes: [ { category: "general", text: "GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7223", url: "https://www.suse.com/security/cve/CVE-2017-7223", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030589 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-7223", }, { cve: "CVE-2017-7224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7224", }, ], notes: [ { category: "general", text: "The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7224", url: "https://www.suse.com/security/cve/CVE-2017-7224", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030588 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-7224", }, { cve: "CVE-2017-7225", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7225", }, ], notes: [ { category: "general", text: "The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7225", url: "https://www.suse.com/security/cve/CVE-2017-7225", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030585 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030585", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-7225", }, { cve: "CVE-2017-7226", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7226", }, ], notes: [ { category: "general", text: "The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7226", url: "https://www.suse.com/security/cve/CVE-2017-7226", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030584 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030584", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-7226", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "critical", }, ], title: "CVE-2017-7226", }, { cve: "CVE-2017-7299", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7299", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7299", url: "https://www.suse.com/security/cve/CVE-2017-7299", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7299", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031644 for CVE-2017-7299", url: "https://bugzilla.suse.com/1031644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-7299", }, { cve: "CVE-2017-7300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7300", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7300", url: "https://www.suse.com/security/cve/CVE-2017-7300", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7300", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031656 for CVE-2017-7300", url: "https://bugzilla.suse.com/1031656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-7300", }, { cve: "CVE-2017-7301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7301", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7301", url: "https://www.suse.com/security/cve/CVE-2017-7301", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7301", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031638 for CVE-2017-7301", url: "https://bugzilla.suse.com/1031638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-7301", }, { cve: "CVE-2017-7302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7302", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7302", url: "https://www.suse.com/security/cve/CVE-2017-7302", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7302", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031595 for CVE-2017-7302", url: "https://bugzilla.suse.com/1031595", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-7302", }, { cve: "CVE-2017-7303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7303", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7303", url: "https://www.suse.com/security/cve/CVE-2017-7303", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7303", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031593 for CVE-2017-7303", url: "https://bugzilla.suse.com/1031593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "important", }, ], title: "CVE-2017-7303", }, { cve: "CVE-2017-7304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7304", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7304", url: "https://www.suse.com/security/cve/CVE-2017-7304", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7304", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031590 for CVE-2017-7304", url: "https://bugzilla.suse.com/1031590", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-7304", }, { cve: "CVE-2017-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8392", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8392", url: "https://www.suse.com/security/cve/CVE-2017-8392", }, { category: "external", summary: "SUSE Bug 1037052 for CVE-2017-8392", url: "https://bugzilla.suse.com/1037052", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-8392", }, { cve: "CVE-2017-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8393", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8393", url: "https://www.suse.com/security/cve/CVE-2017-8393", }, { category: "external", summary: "SUSE Bug 1037057 for CVE-2017-8393", url: "https://bugzilla.suse.com/1037057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-8393", }, { cve: "CVE-2017-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8394", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8394", url: "https://www.suse.com/security/cve/CVE-2017-8394", }, { category: "external", summary: "SUSE Bug 1037061 for CVE-2017-8394", url: "https://bugzilla.suse.com/1037061", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-8394", }, { cve: "CVE-2017-8396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8396", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8396", url: "https://www.suse.com/security/cve/CVE-2017-8396", }, { category: "external", summary: "SUSE Bug 1037066 for CVE-2017-8396", url: "https://bugzilla.suse.com/1037066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-8396", }, { cve: "CVE-2017-8421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8421", }, ], notes: [ { category: "general", text: "The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8421", url: "https://www.suse.com/security/cve/CVE-2017-8421", }, { category: "external", summary: "SUSE Bug 1037273 for CVE-2017-8421", url: "https://bugzilla.suse.com/1037273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-8421", }, { cve: "CVE-2017-9746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9746", }, ], notes: [ { category: "general", text: "The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9746", url: "https://www.suse.com/security/cve/CVE-2017-9746", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9746", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044891 for CVE-2017-9746", url: "https://bugzilla.suse.com/1044891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-9746", }, { cve: "CVE-2017-9747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9747", }, ], notes: [ { category: "general", text: "The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9747", url: "https://www.suse.com/security/cve/CVE-2017-9747", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9747", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044897 for CVE-2017-9747", url: "https://bugzilla.suse.com/1044897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-9747", }, { cve: "CVE-2017-9748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9748", }, ], notes: [ { category: "general", text: "The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9748", url: "https://www.suse.com/security/cve/CVE-2017-9748", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9748", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044901 for CVE-2017-9748", url: "https://bugzilla.suse.com/1044901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-9748", }, { cve: "CVE-2017-9750", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9750", }, ], notes: [ { category: "general", text: "opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9750", url: "https://www.suse.com/security/cve/CVE-2017-9750", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9750", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044909 for CVE-2017-9750", url: "https://bugzilla.suse.com/1044909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-9750", }, { cve: "CVE-2017-9755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9755", }, ], notes: [ { category: "general", text: "opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9755", url: "https://www.suse.com/security/cve/CVE-2017-9755", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9755", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044925 for CVE-2017-9755", url: "https://bugzilla.suse.com/1044925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2017-9755", }, { cve: "CVE-2017-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9756", }, ], notes: [ { category: "general", text: "The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9756", url: "https://www.suse.com/security/cve/CVE-2017-9756", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9756", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044927 for CVE-2017-9756", url: "https://bugzilla.suse.com/1044927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2017-9756", }, { cve: "CVE-2018-10372", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10372", }, ], notes: [ { category: "general", text: "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10372", url: "https://www.suse.com/security/cve/CVE-2018-10372", }, { category: "external", summary: "SUSE Bug 1091015 for CVE-2018-10372", url: "https://bugzilla.suse.com/1091015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-10372", }, { cve: "CVE-2018-10373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10373", }, ], notes: [ { category: "general", text: "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10373", url: "https://www.suse.com/security/cve/CVE-2018-10373", }, { category: "external", summary: "SUSE Bug 1090997 for CVE-2018-10373", url: "https://bugzilla.suse.com/1090997", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-10373", }, { cve: "CVE-2018-10534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10534", }, ], notes: [ { category: "general", text: "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10534", url: "https://www.suse.com/security/cve/CVE-2018-10534", }, { category: "external", summary: "SUSE Bug 1091368 for CVE-2018-10534", url: "https://bugzilla.suse.com/1091368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2018-10534", }, { cve: "CVE-2018-10535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10535", }, ], notes: [ { category: "general", text: "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10535", url: "https://www.suse.com/security/cve/CVE-2018-10535", }, { category: "external", summary: "SUSE Bug 1091365 for CVE-2018-10535", url: "https://bugzilla.suse.com/1091365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-10535", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-18T12:51:00Z", details: "low", }, ], title: "CVE-2018-8945", }, ], }
suse-su-2018:3207-1
Vulnerability from csaf_suse
Published
2018-10-17 14:57
Modified
2018-10-17 14:57
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils to 2.31 fixes the following issues:
These security issues were fixed:
- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
(excessive memory allocation) or possibly have unspecified other impact via a
crafted ELF file that triggered a buffer overflow on fuzzed archive header
(bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
NULL files in a .debug_line file table, which allowed remote attackers to cause
a denial of service (NULL pointer dereference and application crash) via a
crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
file, which allowed remote attackers to cause a denial of service
(find_abstract_instance_name invalid memory read, segmentation fault, and
application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (invalid memory access and application crash) or possibly have
unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
Descriptor (BFD) library (aka libbfd) did not validate size and offset values
in the data dictionary, which allowed remote attackers to cause a denial of
service (segmentation violation and application crash) or possibly have
unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
validate the symbol count, which allowed remote attackers to cause a denial of
service (integer overflow and application crash, or excessive memory
allocation) or possibly have unspecified other impact via a crafted PE file
(bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
integer-overflow protection on 32-bit platforms, which allowed remote attackers
to cause a denial of service (segmentation violation and application crash) or
possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
allowed remote attackers to cause a denial of service (out-of-bounds read and
application crash) or possibly have unspecified other impact via a crafted ELF
file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
cause a denial of service (integer overflow and heap-based buffer over-read,
and application crash) or possibly have unspecified other impact via a crafted
ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
denial of service (slurp_symtab invalid free and application crash) or possibly
have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
library (aka libbfd) had an unsigned integer overflow because bfd_size_type
multiplication is not used. A crafted ELF file allowed remote attackers to
cause a denial of service (application crash) or possibly have unspecified
other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
load_specific_debug_section() which resulted in `malloc()` with 0 size. A
crafted ELF file allowed remote attackers to cause a denial of service
(application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
Remote attackers could have leveraged this vulnerability to cause a denial of
service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (out-of-bounds read and segmentation violation) via a note with a large
alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
remote attackers to cause a denial of service (segmentation fault) or possibly
have unspecified other impact via a crafted file, as demonstrated by objcopy of
a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
to cause a denial of service (NULL pointer dereference and application crash)
via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
remote attackers to cause a denial of service (integer underflow or overflow,
and application crash) via an ELF file with a corrupt DWARF FORM block, as
demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
denial of service (segmentation fault) via a large attribute section
(bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
cause a denial of service (integer overflow and application crash) or possibly
have unspecified other impact via a crafted ELF file, as demonstrated by
objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (aout_32_swap_std_reloc_out NULL pointer dereference and application
crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
library (aka libbfd) allowed remote attackers to cause a denial of service
(integer overflow and application crash) via an ELF file with corrupt dwarf1
debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
(aka libbfd) allowed remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted binary file, as
demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
denial of service (heap-based buffer over-read and application crash) via a
crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
(BFD) library (aka libbfd) did not validate the output_section pointer in the
case of a symtab entry with a 'SECTION' type that has a '0' value, which
allowed remote attackers to cause a denial of service (NULL pointer dereference
and application crash) via a crafted file, as demonstrated by objcopy
(bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
Directory size with an unbounded loop that increased the value of
(external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
memory region, resulting in an out-of-bounds memory write, as demonstrated by
objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
in pex64igen.c (bsc#1091368).
These non-security issues were fixed:
- The AArch64 port now supports showing disassembly notes which are emitted
when inconsistencies are found with the instruction that may result in the
instruction being invalid. These can be turned on with the option -M notes
to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
now only set the bottom bit of the address of thumb function symbols
if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
Build Attribute notes if none are present in the input sources. Add a
--enable-generate-build-notes=[yes|no] configure time option to set the
default behaviour. Set the default if the configure option is not used
to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
shorter instruction encoding.
- Add support for .nops directive. It is currently supported only for
x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
-z separate-code should be enabled in ELF linker by default. Default
to yes for Linux/x86 targets. Note that -z separate-code can increase
disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
sections.
Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
option to objdump which causes indirect links into separate debug info files
to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
for every dynamic object loaded by an executable - provided that the loader
supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would
previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)
Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:
- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
case where the main file name and the directory name are both empty, triggering
a NULL pointer dereference and an invalid write, and leading to a program crash
(bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
invalid write (of size 1) while disassembling a corrupt binary that contains an
empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
(of size 1) while attempting to unget an EOF character from the input stream,
potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
(BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
size 4049 because it used the strlen function instead of strnlen, leading to
program crashes in several utilities such as addr2line, size, and strings. It
could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
function in bfd/elflink.c) did not check the format of the input file trying to
read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
heap-based buffer over-read (off-by-one) because of an incomplete check for
invalid string offsets while loading symbols, leading to a GNU linker (ld)
program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
read (of size 4) because of missing checks for relocs that could not be
recognised. This vulnerability caused Binutils utilities like strip to crash
(bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read (of size 4) because of missing a check (in the
find_link function) for null headers attempting to match them. This
vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
vulnerability because it did not carefully check the string offset. The
vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read (of size 8) because of missing a check (in the
copy_special_section_fields function) for an invalid sh_link field attempting
to follow it. This vulnerability caused Binutils utilities like strip to crash
(bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read of size 8 because of missing a check to determine
whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
vulnerability caused programs that conduct an analysis of binary programs using
the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to a global buffer over-read error because of an assumption made by
code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
named starting with a .rel/.rela prefix. This vulnerability caused programs
that conduct an analysis of binary programs using the libbfd library, such as
objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
_bfd_elf_large_com_section. This vulnerability caused programs that conduct an
analysis of binary programs using the libbfd library, such as objcopy, to crash
(bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
vulnerable to an invalid read of size 1 because the existing reloc offset range
tests didn't catch small negative offsets less than the size of the reloc
field. This vulnerability caused programs that conduct an analysis of binary
programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
(BFD) library (aka libbfd) had a memory leak vulnerability which can cause
memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
attackers to cause a denial of service (buffer overflow and application crash)
or possibly have unspecified other impact via a crafted binary file, as
demonstrated by mishandling of rae insns printing for this file during 'objdump
-D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
(BFD) library (aka libbfd) might have allowed remote attackers to cause a
denial of service (buffer overflow and application crash) or possibly have
unspecified other impact via a crafted binary file, as demonstrated by
mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
library (aka libbfd) might have allowed remote attackers to cause a denial of
service (buffer overflow and application crash) or possibly have unspecified
other impact via a crafted binary file, as demonstrated by mishandling of this
file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
arrays, which allowed remote attackers to cause a denial of service (buffer
overflow and application crash) or possibly have unspecified other impact via a
crafted binary file, as demonstrated by mishandling of this file during
'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
allowed remote attackers to cause a denial of service (buffer overflow and
application crash) or possibly have unspecified other impact via a crafted
binary file, as demonstrated by mishandling of this file during 'objdump -D'
execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
to cause a denial of service (buffer overflow and application crash) or
possibly have unspecified other impact via a crafted binary file, as
demonstrated by mishandling of this file during 'objdump -D' execution
(bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
pointer while reading section contents in a corrupt binary, leading to a
program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
input files containing symbol-difference relocations, leading to a heap-based
buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
error while processing multiple, relocated sections in an MSP430 binary. This
is caused by mishandling of an invalid symbol index, and mishandling of state
across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
processing corrupt RL78 binaries. The vulnerability can trigger program
crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
over-reads (of size 1 and size 8) while handling corrupt STABS enum type
strings in a crafted object file, leading to program crash (bsc#1030297).
Patchnames
SUSE-OpenStack-Cloud-7-2018-2297,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2297,SUSE-SLE-DESKTOP-12-SP3-2018-2297,SUSE-SLE-SAP-12-SP1-2018-2297,SUSE-SLE-SAP-12-SP2-2018-2297,SUSE-SLE-SDK-12-SP3-2018-2297,SUSE-SLE-SERVER-12-2018-2297,SUSE-SLE-SERVER-12-SP1-2018-2297,SUSE-SLE-SERVER-12-SP2-2018-2297,SUSE-SLE-SERVER-12-SP3-2018-2297,SUSE-Storage-4-2018-2297
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils to 2.31 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service\n (excessive memory allocation) or possibly have unspecified other impact via a\n crafted ELF file that triggered a buffer overflow on fuzzed archive header\n (bsc#1065643).\n- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled\n NULL files in a .debug_line file table, which allowed remote attackers to cause\n a denial of service (NULL pointer dereference and application crash) via a\n crafted ELF file, related to concat_filename (bsc#1065689).\n- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)\n miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object\n file, which allowed remote attackers to cause a denial of service\n (find_abstract_instance_name invalid memory read, segmentation fault, and\n application crash) (bsc#1065693).\n- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (invalid memory access and application crash) or possibly have\n unspecified other impact via a crafted PE file (bsc#1068640).\n- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File\n Descriptor (BFD) library (aka libbfd) did not validate size and offset values\n in the data dictionary, which allowed remote attackers to cause a denial of\n service (segmentation violation and application crash) or possibly have\n unspecified other impact via a crafted PE file (bsc#1068643).\n- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not\n validate the symbol count, which allowed remote attackers to cause a denial of\n service (integer overflow and application crash, or excessive memory\n allocation) or possibly have unspecified other impact via a crafted PE file\n (bsc#1068887).\n- CVE-2017-16830: The print_gnu_property_note function did not have\n integer-overflow protection on 32-bit platforms, which allowed remote attackers\n to cause a denial of service (segmentation violation and application crash) or\n possibly have unspecified other impact via a crafted ELF file (bsc#1068888).\n- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File\n Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which\n allowed remote attackers to cause a denial of service (out-of-bounds read and\n application crash) or possibly have unspecified other impact via a crafted ELF\n file (bsc#1068950).\n- CVE-2017-16828: The display_debug_frames function allowed remote attackers to\n cause a denial of service (integer overflow and heap-based buffer over-read,\n and application crash) or possibly have unspecified other impact via a crafted\n ELF file (bsc#1069176).\n- CVE-2017-16827: The aout_get_external_symbols function in the Binary File\n Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a\n denial of service (slurp_symtab invalid free and application crash) or possibly\n have unspecified other impact via a crafted ELF file (bsc#1069202).\n- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)\n library (aka libbfd) had an unsigned integer overflow because bfd_size_type\n multiplication is not used. A crafted ELF file allowed remote attackers to\n cause a denial of service (application crash) or possibly have unspecified\n other impact (bsc#1077745).\n- CVE-2018-6543: Prevent integer overflow in the function\n load_specific_debug_section() which resulted in `malloc()` with 0 size. A\n crafted ELF file allowed remote attackers to cause a denial of service\n (application crash) or possibly have unspecified other impact (bsc#1079103).\n- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File\n Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.\n Remote attackers could have leveraged this vulnerability to cause a denial of\n service (segmentation fault) via a crafted ELF file (bsc#1079741).\n- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (out-of-bounds read and segmentation violation) via a note with a large\n alignment (bsc#1080556).\n- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File\n Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed\n remote attackers to cause a denial of service (segmentation fault) or possibly\n have unspecified other impact via a crafted file, as demonstrated by objcopy of\n a COFF object (bsc#1081527).\n- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in\n the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers\n to cause a denial of service (NULL pointer dereference and application crash)\n via an ELF file with a RELRO segment that lacks a matching LOAD segment, as\n demonstrated by objcopy (bsc#1083528).\n- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed\n remote attackers to cause a denial of service (integer underflow or overflow,\n and application crash) via an ELF file with a corrupt DWARF FORM block, as\n demonstrated by nm (bsc#1083532).\n- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File\n Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a\n denial of service (segmentation fault) via a large attribute section\n (bsc#1086608).\n- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to\n cause a denial of service (integer overflow and application crash) or possibly\n have unspecified other impact via a crafted ELF file, as demonstrated by\n objdump (bsc#1086784).\n- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (aout_32_swap_std_reloc_out NULL pointer dereference and application\n crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).\n- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)\n library (aka libbfd) allowed remote attackers to cause a denial of service\n (integer overflow and application crash) via an ELF file with corrupt dwarf1\n debug information, as demonstrated by nm (bsc#1086788).\n- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library\n (aka libbfd) allowed remote attackers to cause a denial of service (NULL\n pointer dereference and application crash) via a crafted binary file, as\n demonstrated by nm-new (bsc#1090997).\n- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a\n denial of service (heap-based buffer over-read and application crash) via a\n crafted binary file, as demonstrated by readelf (bsc#1091015).\n- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor\n (BFD) library (aka libbfd) did not validate the output_section pointer in the\n case of a symtab entry with a 'SECTION' type that has a '0' value, which\n allowed remote attackers to cause a denial of service (NULL pointer dereference\n and application crash) via a crafted file, as demonstrated by objcopy\n (bsc#1091365).\n- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the\n Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data\n Directory size with an unbounded loop that increased the value of\n (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own\n memory region, resulting in an out-of-bounds memory write, as demonstrated by\n objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common\n in pex64igen.c (bsc#1091368).\n\nThese non-security issues were fixed:\n\n- The AArch64 port now supports showing disassembly notes which are emitted\n when inconsistencies are found with the instruction that may result in the\n instruction being invalid. These can be turned on with the option -M notes\n to objdump.\n- The AArch64 port now emits warnings when a combination of an instruction and\n a named register could be invalid.\n- Added O modifier to ar to display member offsets inside an archive\n- The ADR and ADRL pseudo-instructions supported by the ARM assembler\n now only set the bottom bit of the address of thumb function symbols\n if the -mthumb-interwork command line option is active.\n- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU\n Build Attribute notes if none are present in the input sources. Add a\n --enable-generate-build-notes=[yes|no] configure time option to set the\n default behaviour. Set the default if the configure option is not used\n to 'no'.\n- Remove -mold-gcc command-line option for x86 targets.\n- Add -O[2|s] command-line options to x86 assembler to enable alternate\n shorter instruction encoding.\n- Add support for .nops directive. It is currently supported only for\n x86 targets.\n- Speed up direct linking with DLLs for Cygwin and Mingw targets.\n- Add a configure option --enable-separate-code to decide whether\n -z separate-code should be enabled in ELF linker by default. Default\n to yes for Linux/x86 targets. Note that -z separate-code can increase\n disk and memory size.\n- RISC-V: Fix symbol address problem with versioned symbols \n- Restore riscv64-elf cross prefix via symlinks\n- RISC-V: Don't enable relaxation in relocatable link\n- Prevent linking faiures on i386 with assertion (bsc#1085784)\n- Fix symbol size bug when relaxation deletes bytes\n- Add --debug-dump=links option to readelf and --dwarf=links option to objdump\n which displays the contents of any .gnu_debuglink or .gnu_debugaltlink\n sections.\n Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links\n option to objdump which causes indirect links into separate debug info files\n to be followed when dumping other DWARF sections.\n- Add support for loaction views in DWARF debug line information.\n- Add -z separate-code to generate separate code PT_LOAD segment.\n- Add '-z undefs' command line option as the inverse of the '-z defs' option.\n- Add -z globalaudit command line option to force audit libraries to be run\n for every dynamic object loaded by an executable - provided that the loader\n supports this functionality.\n- Tighten linker script grammar around file name specifiers to prevent the use\n of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would\n previously be accepted but had no effect.\n- The EXCLUDE_FILE directive can now be placed within any SORT_* directive\n within input section lists.\n- Fix linker relaxation with --wrap\n- Add arm-none-eabi symlinks (bsc#1074741)\n\nFormer updates of binutils also fixed the following security issues, for which\nthere was not CVE assigned at the time the update was released or no mapping\nbetween code change and CVE existed:\n\n- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel\n Hex objects (bsc#1030296).\n- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the\n case where the main file name and the directory name are both empty, triggering\n a NULL pointer dereference and an invalid write, and leading to a program crash\n (bsc#1030585).\n- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an\n invalid write (of size 1) while disassembling a corrupt binary that contains an\n empty function name, leading to a program crash (bsc#1030588).\n- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow\n (of size 1) while attempting to unget an EOF character from the input stream,\n potentially leading to a program crash (bsc#1030589).\n- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor\n (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of\n size 4049 because it used the strlen function instead of strnlen, leading to\n program crashes in several utilities such as addr2line, size, and strings. It\n could lead to information disclosure as well (bsc#1030584).\n- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an\n invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link\n function in bfd/elflink.c) did not check the format of the input file trying to\n read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)\n program crash (bsc#1031644).\n- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an\n aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a\n heap-based buffer over-read (off-by-one) because of an incomplete check for\n invalid string offsets while loading symbols, leading to a GNU linker (ld)\n program crash (bsc#1031656).\n- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a\n swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid\n read (of size 4) because of missing checks for relocs that could not be\n recognised. This vulnerability caused Binutils utilities like strip to crash\n (bsc#1031595).\n- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read (of size 4) because of missing a check (in the\n find_link function) for null headers attempting to match them. This\n vulnerability caused Binutils utilities like strip to crash (bsc#1031593).\n- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an\n aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one\n vulnerability because it did not carefully check the string offset. The\n vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).\n- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read (of size 8) because of missing a check (in the\n copy_special_section_fields function) for an invalid sh_link field attempting\n to follow it. This vulnerability caused Binutils utilities like strip to crash\n (bsc#1031590).\n- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read of size 8 because of missing a check to determine\n whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This\n vulnerability caused programs that conduct an analysis of binary programs using\n the libbfd library, such as objdump, to crash (bsc#1037052).\n- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to a global buffer over-read error because of an assumption made by\n code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always\n named starting with a .rel/.rela prefix. This vulnerability caused programs\n that conduct an analysis of binary programs using the libbfd library, such as\n objcopy and strip, to crash (bsc#1037057).\n- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of\n _bfd_elf_large_com_section. This vulnerability caused programs that conduct an\n analysis of binary programs using the libbfd library, such as objcopy, to crash\n (bsc#1037061).\n- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was\n vulnerable to an invalid read of size 1 because the existing reloc offset range\n tests didn't catch small negative offsets less than the size of the reloc\n field. This vulnerability caused programs that conduct an analysis of binary\n programs using the libbfd library, such as objdump, to crash (bsc#1037066).\n- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor\n (BFD) library (aka libbfd) had a memory leak vulnerability which can cause\n memory exhaustion in objdump via a crafted PE file (bsc#1037273).\n- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote\n attackers to cause a denial of service (buffer overflow and application crash)\n or possibly have unspecified other impact via a crafted binary file, as\n demonstrated by mishandling of rae insns printing for this file during 'objdump\n -D' execution (bsc#1044891).\n- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor\n (BFD) library (aka libbfd) might have allowed remote attackers to cause a\n denial of service (buffer overflow and application crash) or possibly have\n unspecified other impact via a crafted binary file, as demonstrated by\n mishandling of this file during 'objdump -D' execution (bsc#1044897).\n- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)\n library (aka libbfd) might have allowed remote attackers to cause a denial of\n service (buffer overflow and application crash) or possibly have unspecified\n other impact via a crafted binary file, as demonstrated by mishandling of this\n file during 'objdump -D' execution (bsc#1044901).\n- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale\n arrays, which allowed remote attackers to cause a denial of service (buffer\n overflow and application crash) or possibly have unspecified other impact via a\n crafted binary file, as demonstrated by mishandling of this file during\n 'objdump -D' execution (bsc#1044909).\n- CVE-2017-9755: Not considering the the number of registers for bnd mode\n allowed remote attackers to cause a denial of service (buffer overflow and\n application crash) or possibly have unspecified other impact via a crafted\n binary file, as demonstrated by mishandling of this file during 'objdump -D'\n execution (bsc#1044925).\n- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers\n to cause a denial of service (buffer overflow and application crash) or\n possibly have unspecified other impact via a crafted binary file, as\n demonstrated by mishandling of this file during 'objdump -D' execution\n (bsc#1044927).\n- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL\n pointer while reading section contents in a corrupt binary, leading to a\n program crash (bsc#1030298).\n- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt\n input files containing symbol-difference relocations, leading to a heap-based\n buffer overflow (bsc#1029909).\n- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)\n error while processing multiple, relocated sections in an MSP430 binary. This\n is caused by mishandling of an invalid symbol index, and mishandling of state\n across invocations (bsc#1029908).\n- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while\n processing corrupt RL78 binaries. The vulnerability can trigger program\n crashes. It may lead to an information leak as well (bsc#1029907).\n- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer\n over-reads (of size 1 and size 8) while handling corrupt STABS enum type\n strings in a crafted object file, leading to program crash (bsc#1030297).\n ", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-7-2018-2297,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2297,SUSE-SLE-DESKTOP-12-SP3-2018-2297,SUSE-SLE-SAP-12-SP1-2018-2297,SUSE-SLE-SAP-12-SP2-2018-2297,SUSE-SLE-SDK-12-SP3-2018-2297,SUSE-SLE-SERVER-12-2018-2297,SUSE-SLE-SERVER-12-SP1-2018-2297,SUSE-SLE-SERVER-12-SP2-2018-2297,SUSE-SLE-SERVER-12-SP3-2018-2297,SUSE-Storage-4-2018-2297", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3207-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3207-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183207-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3207-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html", }, { category: "self", summary: "SUSE Bug 1029907", url: "https://bugzilla.suse.com/1029907", }, { category: "self", summary: "SUSE Bug 1029908", url: "https://bugzilla.suse.com/1029908", }, { category: "self", summary: "SUSE Bug 1029909", url: "https://bugzilla.suse.com/1029909", }, { category: "self", summary: "SUSE Bug 1030296", url: "https://bugzilla.suse.com/1030296", }, { category: "self", summary: "SUSE Bug 1030297", url: "https://bugzilla.suse.com/1030297", }, { category: "self", summary: "SUSE Bug 1030298", url: "https://bugzilla.suse.com/1030298", }, { category: "self", summary: "SUSE Bug 1030584", url: "https://bugzilla.suse.com/1030584", }, { category: "self", summary: "SUSE Bug 1030585", url: "https://bugzilla.suse.com/1030585", }, { category: "self", summary: "SUSE Bug 1030588", url: "https://bugzilla.suse.com/1030588", }, { category: "self", summary: "SUSE Bug 1030589", url: "https://bugzilla.suse.com/1030589", }, { category: "self", summary: "SUSE Bug 1031590", url: "https://bugzilla.suse.com/1031590", }, { category: "self", summary: "SUSE Bug 1031593", url: "https://bugzilla.suse.com/1031593", }, { category: "self", summary: "SUSE Bug 1031595", url: "https://bugzilla.suse.com/1031595", }, { category: "self", summary: "SUSE Bug 1031638", url: "https://bugzilla.suse.com/1031638", }, { category: "self", summary: "SUSE Bug 1031644", url: "https://bugzilla.suse.com/1031644", }, { category: "self", summary: "SUSE Bug 1031656", url: "https://bugzilla.suse.com/1031656", }, { category: "self", summary: "SUSE Bug 1037052", url: "https://bugzilla.suse.com/1037052", }, { category: "self", summary: "SUSE Bug 1037057", url: "https://bugzilla.suse.com/1037057", }, { category: "self", summary: "SUSE Bug 1037061", url: "https://bugzilla.suse.com/1037061", }, { category: "self", summary: "SUSE Bug 1037066", url: "https://bugzilla.suse.com/1037066", }, { category: "self", summary: "SUSE Bug 1037273", url: "https://bugzilla.suse.com/1037273", }, { category: "self", summary: "SUSE Bug 1044891", url: "https://bugzilla.suse.com/1044891", }, { category: "self", summary: "SUSE Bug 1044897", url: "https://bugzilla.suse.com/1044897", }, { category: "self", summary: "SUSE Bug 1044901", url: "https://bugzilla.suse.com/1044901", }, { category: "self", summary: "SUSE Bug 1044909", url: "https://bugzilla.suse.com/1044909", }, { category: "self", summary: "SUSE Bug 1044925", url: "https://bugzilla.suse.com/1044925", }, { category: "self", summary: "SUSE Bug 1044927", url: "https://bugzilla.suse.com/1044927", }, { category: "self", summary: "SUSE Bug 1065643", url: "https://bugzilla.suse.com/1065643", }, { category: "self", summary: "SUSE Bug 1065689", url: "https://bugzilla.suse.com/1065689", }, { category: "self", summary: "SUSE Bug 1065693", url: "https://bugzilla.suse.com/1065693", }, { category: "self", summary: "SUSE Bug 1068640", url: "https://bugzilla.suse.com/1068640", }, { category: "self", summary: "SUSE Bug 1068643", url: "https://bugzilla.suse.com/1068643", }, { category: "self", summary: "SUSE Bug 1068887", url: "https://bugzilla.suse.com/1068887", }, { category: "self", summary: "SUSE Bug 1068888", url: "https://bugzilla.suse.com/1068888", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1069176", url: "https://bugzilla.suse.com/1069176", }, { category: "self", summary: "SUSE Bug 1069202", url: "https://bugzilla.suse.com/1069202", }, { category: "self", summary: "SUSE Bug 1074741", url: "https://bugzilla.suse.com/1074741", }, { category: "self", summary: "SUSE Bug 1077745", url: "https://bugzilla.suse.com/1077745", }, { category: "self", summary: "SUSE Bug 1079103", url: "https://bugzilla.suse.com/1079103", }, { category: "self", summary: "SUSE Bug 1079741", url: "https://bugzilla.suse.com/1079741", }, { category: "self", summary: "SUSE Bug 1080556", url: "https://bugzilla.suse.com/1080556", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1083528", url: "https://bugzilla.suse.com/1083528", }, { category: "self", summary: "SUSE Bug 1083532", url: "https://bugzilla.suse.com/1083532", }, { category: "self", summary: "SUSE Bug 1085784", url: "https://bugzilla.suse.com/1085784", }, { category: "self", summary: "SUSE Bug 1086608", url: "https://bugzilla.suse.com/1086608", }, { category: "self", summary: "SUSE Bug 1086784", url: "https://bugzilla.suse.com/1086784", }, { category: "self", summary: "SUSE Bug 1086786", url: "https://bugzilla.suse.com/1086786", }, { category: "self", summary: "SUSE Bug 1086788", url: "https://bugzilla.suse.com/1086788", }, { category: "self", summary: "SUSE Bug 1090997", url: "https://bugzilla.suse.com/1090997", }, { category: "self", summary: "SUSE Bug 1091015", url: "https://bugzilla.suse.com/1091015", }, { category: "self", summary: "SUSE Bug 1091365", url: "https://bugzilla.suse.com/1091365", }, { category: "self", summary: "SUSE Bug 1091368", url: "https://bugzilla.suse.com/1091368", }, { category: "self", summary: "SUSE CVE CVE-2014-9939 page", url: "https://www.suse.com/security/cve/CVE-2014-9939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15938 page", url: "https://www.suse.com/security/cve/CVE-2017-15938/", }, { category: "self", summary: "SUSE CVE CVE-2017-15939 page", url: "https://www.suse.com/security/cve/CVE-2017-15939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15996 page", url: "https://www.suse.com/security/cve/CVE-2017-15996/", }, { category: "self", summary: "SUSE CVE CVE-2017-16826 page", url: "https://www.suse.com/security/cve/CVE-2017-16826/", }, { category: "self", summary: "SUSE CVE CVE-2017-16827 page", url: "https://www.suse.com/security/cve/CVE-2017-16827/", }, { category: "self", summary: "SUSE CVE CVE-2017-16828 page", url: "https://www.suse.com/security/cve/CVE-2017-16828/", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2017-16830 page", url: "https://www.suse.com/security/cve/CVE-2017-16830/", }, { category: "self", summary: "SUSE CVE CVE-2017-16831 page", url: "https://www.suse.com/security/cve/CVE-2017-16831/", }, { category: "self", summary: "SUSE CVE CVE-2017-16832 page", url: "https://www.suse.com/security/cve/CVE-2017-16832/", }, { category: "self", summary: "SUSE CVE CVE-2017-6965 page", url: "https://www.suse.com/security/cve/CVE-2017-6965/", }, { category: "self", summary: "SUSE CVE CVE-2017-6966 page", url: "https://www.suse.com/security/cve/CVE-2017-6966/", }, { category: "self", summary: "SUSE CVE CVE-2017-6969 page", url: "https://www.suse.com/security/cve/CVE-2017-6969/", }, { category: "self", summary: "SUSE CVE CVE-2017-7209 page", url: "https://www.suse.com/security/cve/CVE-2017-7209/", }, { category: "self", summary: "SUSE CVE CVE-2017-7210 page", url: "https://www.suse.com/security/cve/CVE-2017-7210/", }, { category: "self", summary: "SUSE CVE CVE-2017-7223 page", url: "https://www.suse.com/security/cve/CVE-2017-7223/", }, { category: "self", summary: "SUSE CVE CVE-2017-7224 page", url: "https://www.suse.com/security/cve/CVE-2017-7224/", }, { category: "self", summary: "SUSE CVE CVE-2017-7225 page", url: "https://www.suse.com/security/cve/CVE-2017-7225/", }, { category: "self", summary: "SUSE CVE CVE-2017-7226 page", url: "https://www.suse.com/security/cve/CVE-2017-7226/", }, { category: "self", summary: "SUSE CVE CVE-2017-7299 page", url: "https://www.suse.com/security/cve/CVE-2017-7299/", }, { category: "self", summary: "SUSE CVE CVE-2017-7300 page", url: "https://www.suse.com/security/cve/CVE-2017-7300/", }, { category: "self", summary: "SUSE CVE CVE-2017-7301 page", url: "https://www.suse.com/security/cve/CVE-2017-7301/", }, { category: "self", summary: "SUSE CVE CVE-2017-7302 page", url: "https://www.suse.com/security/cve/CVE-2017-7302/", }, { category: "self", summary: "SUSE CVE CVE-2017-7303 page", url: "https://www.suse.com/security/cve/CVE-2017-7303/", }, { category: "self", summary: "SUSE CVE CVE-2017-7304 page", url: "https://www.suse.com/security/cve/CVE-2017-7304/", }, { category: "self", summary: "SUSE CVE CVE-2017-8392 page", url: "https://www.suse.com/security/cve/CVE-2017-8392/", }, { category: "self", summary: "SUSE CVE CVE-2017-8393 page", url: "https://www.suse.com/security/cve/CVE-2017-8393/", }, { category: "self", summary: "SUSE CVE CVE-2017-8394 page", url: "https://www.suse.com/security/cve/CVE-2017-8394/", }, { category: "self", summary: "SUSE CVE CVE-2017-8396 page", url: "https://www.suse.com/security/cve/CVE-2017-8396/", }, { category: "self", summary: "SUSE CVE CVE-2017-8421 page", url: "https://www.suse.com/security/cve/CVE-2017-8421/", }, { category: "self", summary: "SUSE CVE CVE-2017-9746 page", url: "https://www.suse.com/security/cve/CVE-2017-9746/", }, { category: "self", summary: "SUSE CVE CVE-2017-9747 page", url: "https://www.suse.com/security/cve/CVE-2017-9747/", }, { category: "self", summary: "SUSE CVE CVE-2017-9748 page", url: "https://www.suse.com/security/cve/CVE-2017-9748/", }, { category: "self", summary: "SUSE CVE CVE-2017-9750 page", url: "https://www.suse.com/security/cve/CVE-2017-9750/", }, { category: "self", summary: "SUSE CVE CVE-2017-9755 page", url: "https://www.suse.com/security/cve/CVE-2017-9755/", }, { category: "self", summary: "SUSE CVE CVE-2017-9756 page", url: "https://www.suse.com/security/cve/CVE-2017-9756/", }, { category: "self", summary: "SUSE CVE CVE-2018-10372 page", url: "https://www.suse.com/security/cve/CVE-2018-10372/", }, { category: "self", summary: "SUSE CVE CVE-2018-10373 page", url: "https://www.suse.com/security/cve/CVE-2018-10373/", }, { category: "self", summary: "SUSE CVE CVE-2018-10534 page", url: "https://www.suse.com/security/cve/CVE-2018-10534/", }, { category: "self", summary: "SUSE CVE CVE-2018-10535 page", url: "https://www.suse.com/security/cve/CVE-2018-10535/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2018-10-17T14:57:07Z", generator: { date: "2018-10-17T14:57:07Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3207-1", initial_release_date: "2018-10-17T14:57:07Z", revision_history: [ { date: "2018-10-17T14:57:07Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-devel-2.31-9.26.1.aarch64", product: { name: "binutils-devel-2.31-9.26.1.aarch64", product_id: "binutils-devel-2.31-9.26.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.31-9.26.1.aarch64", product: { name: "binutils-gold-2.31-9.26.1.aarch64", product_id: "binutils-gold-2.31-9.26.1.aarch64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.31-9.26.1.aarch64", product: { name: "cross-ppc-binutils-2.31-9.26.1.aarch64", product_id: "cross-ppc-binutils-2.31-9.26.1.aarch64", }, }, { category: "product_version", name: "cross-spu-binutils-2.31-9.26.1.aarch64", product: { name: "cross-spu-binutils-2.31-9.26.1.aarch64", product_id: "cross-spu-binutils-2.31-9.26.1.aarch64", }, }, { category: "product_version", name: "binutils-2.31-9.26.1.aarch64", product: { name: "binutils-2.31-9.26.1.aarch64", product_id: "binutils-2.31-9.26.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-2.31-9.26.1.ppc64le", product: { name: "binutils-2.31-9.26.1.ppc64le", product_id: "binutils-2.31-9.26.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.31-9.26.1.ppc64le", product: { name: "binutils-devel-2.31-9.26.1.ppc64le", product_id: "binutils-devel-2.31-9.26.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.31-9.26.1.ppc64le", product: { name: "binutils-gold-2.31-9.26.1.ppc64le", product_id: "binutils-gold-2.31-9.26.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc-binutils-2.31-9.26.1.ppc64le", product: { name: "cross-ppc-binutils-2.31-9.26.1.ppc64le", product_id: "cross-ppc-binutils-2.31-9.26.1.ppc64le", }, }, { category: "product_version", name: "cross-spu-binutils-2.31-9.26.1.ppc64le", product: { name: "cross-spu-binutils-2.31-9.26.1.ppc64le", product_id: "cross-spu-binutils-2.31-9.26.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.31-9.26.1.s390x", product: { name: "binutils-2.31-9.26.1.s390x", product_id: "binutils-2.31-9.26.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.31-9.26.1.s390x", product: { name: "binutils-devel-2.31-9.26.1.s390x", product_id: "binutils-devel-2.31-9.26.1.s390x", }, }, { category: "product_version", name: "cross-ppc-binutils-2.31-9.26.1.s390x", product: { name: "cross-ppc-binutils-2.31-9.26.1.s390x", product_id: "cross-ppc-binutils-2.31-9.26.1.s390x", }, }, { category: "product_version", name: "cross-spu-binutils-2.31-9.26.1.s390x", product: { name: "cross-spu-binutils-2.31-9.26.1.s390x", product_id: "cross-spu-binutils-2.31-9.26.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.31-9.26.1.x86_64", product: { name: "binutils-2.31-9.26.1.x86_64", product_id: "binutils-2.31-9.26.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.31-9.26.1.x86_64", product: { name: "binutils-devel-2.31-9.26.1.x86_64", product_id: "binutils-devel-2.31-9.26.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.31-9.26.1.x86_64", product: { name: "binutils-gold-2.31-9.26.1.x86_64", product_id: "binutils-gold-2.31-9.26.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.31-9.26.1.x86_64", product: { name: "cross-ppc-binutils-2.31-9.26.1.x86_64", product_id: "cross-ppc-binutils-2.31-9.26.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.31-9.26.1.x86_64", product: { name: "cross-spu-binutils-2.31-9.26.1.x86_64", product_id: "cross-spu-binutils-2.31-9.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", }, product_reference: "binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-9.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", }, product_reference: "binutils-devel-2.31-9.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", }, product_reference: "binutils-devel-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", }, product_reference: "binutils-devel-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", }, product_reference: "binutils-devel-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.31-9.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", }, product_reference: "binutils-gold-2.31-9.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", }, product_reference: "binutils-gold-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", }, product_reference: "binutils-gold-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.31-9.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", }, product_reference: "cross-ppc-binutils-2.31-9.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", }, product_reference: "cross-ppc-binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", }, product_reference: "cross-ppc-binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", }, product_reference: "cross-ppc-binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.31-9.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", }, product_reference: "cross-spu-binutils-2.31-9.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", }, product_reference: "cross-spu-binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", }, product_reference: "cross-spu-binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", }, product_reference: "cross-spu-binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", }, product_reference: "binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", }, product_reference: "binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", }, product_reference: "binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", }, product_reference: "binutils-2.31-9.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", }, product_reference: "binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", }, product_reference: "binutils-2.31-9.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", }, product_reference: "binutils-2.31-9.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", }, product_reference: "binutils-2.31-9.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-9.26.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", }, product_reference: "binutils-2.31-9.26.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2014-9939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9939", }, ], notes: [ { category: "general", text: "ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9939", url: "https://www.suse.com/security/cve/CVE-2014-9939", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2014-9939", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2014-9939", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2014-9939", }, { cve: "CVE-2017-15938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15938", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15938", url: "https://www.suse.com/security/cve/CVE-2017-15938", }, { category: "external", summary: "SUSE Bug 1065693 for CVE-2017-15938", url: "https://bugzilla.suse.com/1065693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-15938", }, { cve: "CVE-2017-15939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15939", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15939", url: "https://www.suse.com/security/cve/CVE-2017-15939", }, { category: "external", summary: "SUSE Bug 1061623 for CVE-2017-15939", url: "https://bugzilla.suse.com/1061623", }, { category: "external", summary: "SUSE Bug 1065689 for CVE-2017-15939", url: "https://bugzilla.suse.com/1065689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-15939", }, { cve: "CVE-2017-15996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15996", }, ], notes: [ { category: "general", text: "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15996", url: "https://www.suse.com/security/cve/CVE-2017-15996", }, { category: "external", summary: "SUSE Bug 1065643 for CVE-2017-15996", url: "https://bugzilla.suse.com/1065643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-15996", }, { cve: "CVE-2017-16826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16826", }, ], notes: [ { category: "general", text: "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16826", url: "https://www.suse.com/security/cve/CVE-2017-16826", }, { category: "external", summary: "SUSE Bug 1068640 for CVE-2017-16826", url: "https://bugzilla.suse.com/1068640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-16826", }, { cve: "CVE-2017-16827", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16827", }, ], notes: [ { category: "general", text: "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16827", url: "https://www.suse.com/security/cve/CVE-2017-16827", }, { category: "external", summary: "SUSE Bug 1069202 for CVE-2017-16827", url: "https://bugzilla.suse.com/1069202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-16827", }, { cve: "CVE-2017-16828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16828", }, ], notes: [ { category: "general", text: "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16828", url: "https://www.suse.com/security/cve/CVE-2017-16828", }, { category: "external", summary: "SUSE Bug 1069176 for CVE-2017-16828", url: "https://bugzilla.suse.com/1069176", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-16828", }, { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2017-16830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16830", }, ], notes: [ { category: "general", text: "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16830", url: "https://www.suse.com/security/cve/CVE-2017-16830", }, { category: "external", summary: "SUSE Bug 1068888 for CVE-2017-16830", url: "https://bugzilla.suse.com/1068888", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-16830", }, { cve: "CVE-2017-16831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16831", }, ], notes: [ { category: "general", text: "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16831", url: "https://www.suse.com/security/cve/CVE-2017-16831", }, { category: "external", summary: "SUSE Bug 1068887 for CVE-2017-16831", url: "https://bugzilla.suse.com/1068887", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-16831", }, { cve: "CVE-2017-16832", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16832", }, ], notes: [ { category: "general", text: "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16832", url: "https://www.suse.com/security/cve/CVE-2017-16832", }, { category: "external", summary: "SUSE Bug 1068643 for CVE-2017-16832", url: "https://bugzilla.suse.com/1068643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-16832", }, { cve: "CVE-2017-6965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6965", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6965", url: "https://www.suse.com/security/cve/CVE-2017-6965", }, { category: "external", summary: "SUSE Bug 1029909 for CVE-2017-6965", url: "https://bugzilla.suse.com/1029909", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6965", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-6965", }, { cve: "CVE-2017-6966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6966", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6966", url: "https://www.suse.com/security/cve/CVE-2017-6966", }, { category: "external", summary: "SUSE Bug 1029908 for CVE-2017-6966", url: "https://bugzilla.suse.com/1029908", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6966", url: "https://bugzilla.suse.com/1030296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-6966", }, { cve: "CVE-2017-6969", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6969", }, ], notes: [ { category: "general", text: "readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6969", url: "https://www.suse.com/security/cve/CVE-2017-6969", }, { category: "external", summary: "SUSE Bug 1029907 for CVE-2017-6969", url: "https://bugzilla.suse.com/1029907", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-6969", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-6969", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "critical", }, ], title: "CVE-2017-6969", }, { cve: "CVE-2017-7209", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7209", }, ], notes: [ { category: "general", text: "The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7209", url: "https://www.suse.com/security/cve/CVE-2017-7209", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030298 for CVE-2017-7209", url: "https://bugzilla.suse.com/1030298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-7209", }, { cve: "CVE-2017-7210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7210", }, ], notes: [ { category: "general", text: "objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7210", url: "https://www.suse.com/security/cve/CVE-2017-7210", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030297 for CVE-2017-7210", url: "https://bugzilla.suse.com/1030297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-7210", }, { cve: "CVE-2017-7223", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7223", }, ], notes: [ { category: "general", text: "GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7223", url: "https://www.suse.com/security/cve/CVE-2017-7223", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030589 for CVE-2017-7223", url: "https://bugzilla.suse.com/1030589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-7223", }, { cve: "CVE-2017-7224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7224", }, ], notes: [ { category: "general", text: "The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7224", url: "https://www.suse.com/security/cve/CVE-2017-7224", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030588 for CVE-2017-7224", url: "https://bugzilla.suse.com/1030588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-7224", }, { cve: "CVE-2017-7225", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7225", }, ], notes: [ { category: "general", text: "The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7225", url: "https://www.suse.com/security/cve/CVE-2017-7225", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030585 for CVE-2017-7225", url: "https://bugzilla.suse.com/1030585", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-7225", }, { cve: "CVE-2017-7226", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7226", }, ], notes: [ { category: "general", text: "The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7226", url: "https://www.suse.com/security/cve/CVE-2017-7226", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1030584 for CVE-2017-7226", url: "https://bugzilla.suse.com/1030584", }, { category: "external", summary: "SUSE Bug 1105209 for CVE-2017-7226", url: "https://bugzilla.suse.com/1105209", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "critical", }, ], title: "CVE-2017-7226", }, { cve: "CVE-2017-7299", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7299", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7299", url: "https://www.suse.com/security/cve/CVE-2017-7299", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7299", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031644 for CVE-2017-7299", url: "https://bugzilla.suse.com/1031644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-7299", }, { cve: "CVE-2017-7300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7300", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7300", url: "https://www.suse.com/security/cve/CVE-2017-7300", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7300", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031656 for CVE-2017-7300", url: "https://bugzilla.suse.com/1031656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-7300", }, { cve: "CVE-2017-7301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7301", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7301", url: "https://www.suse.com/security/cve/CVE-2017-7301", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7301", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031638 for CVE-2017-7301", url: "https://bugzilla.suse.com/1031638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-7301", }, { cve: "CVE-2017-7302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7302", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7302", url: "https://www.suse.com/security/cve/CVE-2017-7302", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7302", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031595 for CVE-2017-7302", url: "https://bugzilla.suse.com/1031595", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-7302", }, { cve: "CVE-2017-7303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7303", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7303", url: "https://www.suse.com/security/cve/CVE-2017-7303", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7303", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031593 for CVE-2017-7303", url: "https://bugzilla.suse.com/1031593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "important", }, ], title: "CVE-2017-7303", }, { cve: "CVE-2017-7304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7304", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7304", url: "https://www.suse.com/security/cve/CVE-2017-7304", }, { category: "external", summary: "SUSE Bug 1030295 for CVE-2017-7304", url: "https://bugzilla.suse.com/1030295", }, { category: "external", summary: "SUSE Bug 1031590 for CVE-2017-7304", url: "https://bugzilla.suse.com/1031590", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-7304", }, { cve: "CVE-2017-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8392", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8392", url: "https://www.suse.com/security/cve/CVE-2017-8392", }, { category: "external", summary: "SUSE Bug 1037052 for CVE-2017-8392", url: "https://bugzilla.suse.com/1037052", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-8392", }, { cve: "CVE-2017-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8393", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8393", url: "https://www.suse.com/security/cve/CVE-2017-8393", }, { category: "external", summary: "SUSE Bug 1037057 for CVE-2017-8393", url: "https://bugzilla.suse.com/1037057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-8393", }, { cve: "CVE-2017-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8394", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8394", url: "https://www.suse.com/security/cve/CVE-2017-8394", }, { category: "external", summary: "SUSE Bug 1037061 for CVE-2017-8394", url: "https://bugzilla.suse.com/1037061", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-8394", }, { cve: "CVE-2017-8396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8396", }, ], notes: [ { category: "general", text: "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8396", url: "https://www.suse.com/security/cve/CVE-2017-8396", }, { category: "external", summary: "SUSE Bug 1037066 for CVE-2017-8396", url: "https://bugzilla.suse.com/1037066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-8396", }, { cve: "CVE-2017-8421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8421", }, ], notes: [ { category: "general", text: "The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8421", url: "https://www.suse.com/security/cve/CVE-2017-8421", }, { category: "external", summary: "SUSE Bug 1037273 for CVE-2017-8421", url: "https://bugzilla.suse.com/1037273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-8421", }, { cve: "CVE-2017-9746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9746", }, ], notes: [ { category: "general", text: "The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9746", url: "https://www.suse.com/security/cve/CVE-2017-9746", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9746", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044891 for CVE-2017-9746", url: "https://bugzilla.suse.com/1044891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-9746", }, { cve: "CVE-2017-9747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9747", }, ], notes: [ { category: "general", text: "The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9747", url: "https://www.suse.com/security/cve/CVE-2017-9747", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9747", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044897 for CVE-2017-9747", url: "https://bugzilla.suse.com/1044897", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-9747", }, { cve: "CVE-2017-9748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9748", }, ], notes: [ { category: "general", text: "The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9748", url: "https://www.suse.com/security/cve/CVE-2017-9748", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9748", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044901 for CVE-2017-9748", url: "https://bugzilla.suse.com/1044901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-9748", }, { cve: "CVE-2017-9750", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9750", }, ], notes: [ { category: "general", text: "opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9750", url: "https://www.suse.com/security/cve/CVE-2017-9750", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9750", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044909 for CVE-2017-9750", url: "https://bugzilla.suse.com/1044909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-9750", }, { cve: "CVE-2017-9755", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9755", }, ], notes: [ { category: "general", text: "opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9755", url: "https://www.suse.com/security/cve/CVE-2017-9755", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9755", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044925 for CVE-2017-9755", url: "https://bugzilla.suse.com/1044925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2017-9755", }, { cve: "CVE-2017-9756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9756", }, ], notes: [ { category: "general", text: "The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9756", url: "https://www.suse.com/security/cve/CVE-2017-9756", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9756", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1044927 for CVE-2017-9756", url: "https://bugzilla.suse.com/1044927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2017-9756", }, { cve: "CVE-2018-10372", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10372", }, ], notes: [ { category: "general", text: "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10372", url: "https://www.suse.com/security/cve/CVE-2018-10372", }, { category: "external", summary: "SUSE Bug 1091015 for CVE-2018-10372", url: "https://bugzilla.suse.com/1091015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-10372", }, { cve: "CVE-2018-10373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10373", }, ], notes: [ { category: "general", text: "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10373", url: "https://www.suse.com/security/cve/CVE-2018-10373", }, { category: "external", summary: "SUSE Bug 1090997 for CVE-2018-10373", url: "https://bugzilla.suse.com/1090997", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-10373", }, { cve: "CVE-2018-10534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10534", }, ], notes: [ { category: "general", text: "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10534", url: "https://www.suse.com/security/cve/CVE-2018-10534", }, { category: "external", summary: "SUSE Bug 1091368 for CVE-2018-10534", url: "https://bugzilla.suse.com/1091368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2018-10534", }, { cve: "CVE-2018-10535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10535", }, ], notes: [ { category: "general", text: "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10535", url: "https://www.suse.com/security/cve/CVE-2018-10535", }, { category: "external", summary: "SUSE Bug 1091365 for CVE-2018-10535", url: "https://bugzilla.suse.com/1091365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-10535", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-devel-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:binutils-gold-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-ppc-binutils-2.31-9.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:cross-spu-binutils-2.31-9.26.1.x86_64", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.s390x", "SUSE OpenStack Cloud 7:binutils-2.31-9.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-17T14:57:07Z", details: "low", }, ], title: "CVE-2018-8945", }, ], }
suse-su-2023:2485-1
Vulnerability from csaf_suse
Published
2023-06-12 06:54
Modified
2023-06-12 06:54
Summary
Security update for gdb
Notes
Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues:
gdb was updated to 12.1. (jsc#SLE-21561)
* DBX mode is deprecated, and will be removed in GDB 13.
* GDB 12 is the last release of GDB that will support building against
Python 2. From GDB 13, it will only be possible to build GDB itself
with Python 3 support.
* Improved C++ template support:
GDB now treats functions/types involving C++ templates like it does function
overloads. Users may omit parameter lists to set breakpoints on families of
template functions, including types/functions composed of multiple template types:
(gdb) break template_func(template_1, int)
The above will set breakpoints at every function `template_func' where
the first function parameter is any template type named `template_1' and
the second function parameter is `int'.
TAB completion also gains similar improvements.
* New commands:
- maint set backtrace-on-fatal-signal on|off
- maint show backtrace-on-fatal-signal
This setting is 'on' by default. When 'on' GDB will print a limited
backtrace to stderr in the situation where GDB terminates with a
fatal signal. This only supported on some platforms where the
backtrace and backtrace_symbols_fd functions are available.
- set source open on|off
- show source open
This setting, which is on by default, controls whether GDB will try
to open source code files. Switching this off will stop GDB trying
to open and read source code files, which can be useful if the files
are located over a slow network connection.
- set varsize-limit
- show varsize-limit
These are now deprecated aliases for 'set max-value-size' and
'show max-value-size'.
- task apply [all | TASK-IDS...] [FLAG]... COMMAND
Like 'thread apply', but applies COMMAND to Ada tasks.
- watch [...] task ID
Watchpoints can now be restricted to a specific Ada task.
- maint set internal-error backtrace on|off
- maint show internal-error backtrace
- maint set internal-warning backtrace on|off
- maint show internal-warning backtrace
GDB can now print a backtrace of itself when it encounters either an
internal-error, or an internal-warning. This is on by default for
internal-error and off by default for internal-warning.
- set logging on|off
Deprecated and replaced by 'set logging enabled on|off'.
- set logging enabled on|off
- show logging enabled
These commands set or show whether logging is enabled or disabled.
- exit
You can now exit GDB by using the new command 'exit', in addition to
the existing 'quit' command.
- set debug threads on|off
- show debug threads
Print additional debug messages about thread creation and deletion.
- set debug linux-nat on|off
- show debug linux-nat
These new commands replaced the old 'set debug lin-lwp' and 'show
debug lin-lwp' respectively. Turning this setting on prints debug
messages relating to GDB's handling of native Linux inferiors.
- maint flush source-cache
Flush the contents of the source code cache.
- maint set gnu-source-highlight enabled on|off
- maint show gnu-source-highlight enabled
Whether GDB should use the GNU Source Highlight library for adding
styling to source code. When off, the library will not be used, even
when available. When GNU Source Highlight isn't used, or can't add
styling to a particular source file, then the Python Pygments
library will be used instead.
- set suppress-cli-notifications (on|off)
- show suppress-cli-notifications
This controls whether printing the notifications is suppressed for CLI.
CLI notifications occur when you change the selected context
(i.e., the current inferior, thread and/or the frame), or when
the program being debugged stops (e.g., because of hitting a
breakpoint, completing source-stepping, an interrupt, etc.).
- set style disassembler enabled on|off
- show style disassembler enabled
If GDB is compiled with Python support, and the Python Pygments
package is available, then, when this setting is on, disassembler
output will have styling applied.
- set ada source-charset
- show ada source-charset
Set the character set encoding that is assumed for Ada symbols. Valid
values for this follow the values that can be passed to the GNAT
compiler via the '-gnati' option. The default is ISO-8859-1.
* Changed commands:
- print
Printing of floating-point values with base-modifying formats like
/x has been changed to display the underlying bytes of the value in
the desired base. This was GDB's documented behavior, but was never
implemented correctly.
- maint packet
This command can now print a reply, if the reply includes
non-printable characters. Any non-printable characters are printed
as escaped hex, e.g. \x?? where '??' is replaces with the value of
the non-printable character.
- clone-inferior
The clone-inferior command now ensures that the TTY, CMD and ARGS
settings are copied from the original inferior to the new one.
All modifications to the environment variables done using the 'set
environment' or 'unset environment' commands are also copied to the new
inferior.
- set debug lin-lwp on|off
- show debug lin-lwp
These commands have been removed from GDB. The new command 'set
debug linux-nat' and 'show debug linux-nat' should be used
instead.
- info win
This command now includes information about the width of the tui
windows in its output.
* GDB's Ada parser now supports an extension for specifying the exact
byte contents of a floating-point literal. This can be useful for
setting floating-point registers to a precise value without loss of
precision. The syntax is an extension of the based literal syntax.
Use, e.g., '16lf#0123abcd#' -- the number of 'l's controls the width
of the floating-point type, and the 'f' is the marker for floating
point.
* MI changes:
** The '-add-inferior' with no option flags now inherits the
connection of the current inferior, this restores the behaviour of
GDB as it was prior to GDB 10.
** The '-add-inferior' command now accepts a '--no-connection'
option, which causes the new inferior to start without a
connection.
* Python API:
** New function gdb.add_history(), which takes a gdb.Value object
and adds the value it represents to GDB's history list. An
integer, the index of the new item in the history list, is
returned.
** New function gdb.history_count(), which returns the number of
values in GDB's value history.
** New gdb.events.gdb_exiting event. This event is called with a
gdb.GdbExitingEvent object which has the read-only attribute
'exit_code', which contains the value of the GDB exit code. This
event is triggered once GDB decides it is going to exit, but
before GDB starts to clean up its internal state.
** New function gdb.architecture_names(), which returns a list
containing all of the possible Architecture.name() values. Each
entry is a string.
** New function gdb.Architecture.integer_type(), which returns an
integer type given a size and a signed-ness.
** New gdb.TargetConnection object type that represents a connection
(as displayed by the 'info connections' command). A sub-class,
gdb.RemoteTargetConnection, is used to represent 'remote' and
'extended-remote' connections.
** The gdb.Inferior type now has a 'connection' property which is an
instance of gdb.TargetConnection, the connection used by this
inferior. This can be None if the inferior has no connection.
** New 'gdb.events.connection_removed' event registry, which emits a
'gdb.ConnectionEvent' when a connection is removed from GDB.
This event has a 'connection' property, a gdb.TargetConnection
object for the connection being removed.
** New gdb.connections() function that returns a list of all
currently active connections.
** New gdb.RemoteTargetConnection.send_packet(PACKET) method. This
is equivalent to the existing 'maint packet' CLI command; it
allows a user specified packet to be sent to the remote target.
** New function gdb.host_charset(), returns a string, which is the
name of the current host charset.
** New gdb.set_parameter(NAME, VALUE). This sets the gdb parameter
NAME to VALUE.
** New gdb.with_parameter(NAME, VALUE). This returns a context
manager that temporarily sets the gdb parameter NAME to VALUE,
then resets it when the context is exited.
** The gdb.Value.format_string method now takes a 'styling'
argument, which is a boolean. When true, the returned string can
include escape sequences to apply styling. The styling will only
be present if styling is otherwise turned on in GDB (see 'help
set styling'). When false, which is the default if the argument
is not given, then no styling is applied to the returned string.
** New read-only attribute gdb.InferiorThread.details, which is
either a string, containing additional, target specific thread
state information, or None, if there is no such additional
information.
** New read-only attribute gdb.Type.is_scalar, which is True for
scalar types, and False for all other types.
** New read-only attribute gdb.Type.is_signed. This attribute
should only be read when Type.is_scalar is True, and will be True
for signed types, and False for all other types. Attempting to
read this attribute for non-scalar types will raise a ValueError.
** It is now possible to add GDB/MI commands implemented in Python.
- Update libipt to v2.0.5.
- CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527).
- CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950).
Bug fixes:
- Fixed license (bsc#1210081).
- Advertises RHEL version support status (bsc#1207712).
- Fixed crashes while debugging a clang-cpp app (bsc#1192285).
Patchnames
SUSE-2023-2485,SUSE-SLE-SDK-12-SP5-2023-2485,SUSE-SLE-SERVER-12-SP5-2023-2485
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for gdb", title: "Title of the patch", }, { category: "description", text: "This update for gdb fixes the following issues:\n\ngdb was updated to 12.1. (jsc#SLE-21561)\n\n* DBX mode is deprecated, and will be removed in GDB 13.\n\n* GDB 12 is the last release of GDB that will support building against\n Python 2. From GDB 13, it will only be possible to build GDB itself\n with Python 3 support.\n\n* Improved C++ template support:\n\n GDB now treats functions/types involving C++ templates like it does function\n overloads. Users may omit parameter lists to set breakpoints on families of\n template functions, including types/functions composed of multiple template types:\n (gdb) break template_func(template_1, int)\n The above will set breakpoints at every function `template_func' where\n the first function parameter is any template type named `template_1' and\n the second function parameter is `int'.\n TAB completion also gains similar improvements.\n\n* New commands:\n\n - maint set backtrace-on-fatal-signal on|off\n - maint show backtrace-on-fatal-signal\n\n This setting is 'on' by default. When 'on' GDB will print a limited\n backtrace to stderr in the situation where GDB terminates with a\n fatal signal. This only supported on some platforms where the\n backtrace and backtrace_symbols_fd functions are available.\n\n - set source open on|off\n - show source open\n\n This setting, which is on by default, controls whether GDB will try\n to open source code files. Switching this off will stop GDB trying\n to open and read source code files, which can be useful if the files\n are located over a slow network connection.\n\n - set varsize-limit\n - show varsize-limit\n\n These are now deprecated aliases for 'set max-value-size' and\n 'show max-value-size'.\n\n - task apply [all | TASK-IDS...] [FLAG]... COMMAND\n\n Like 'thread apply', but applies COMMAND to Ada tasks.\n\n - watch [...] task ID\n\n Watchpoints can now be restricted to a specific Ada task.\n\n - maint set internal-error backtrace on|off\n - maint show internal-error backtrace\n - maint set internal-warning backtrace on|off\n - maint show internal-warning backtrace\n\n GDB can now print a backtrace of itself when it encounters either an\n internal-error, or an internal-warning. This is on by default for\n internal-error and off by default for internal-warning.\n\n - set logging on|off\n\n Deprecated and replaced by 'set logging enabled on|off'.\n\n - set logging enabled on|off\n - show logging enabled\n\n These commands set or show whether logging is enabled or disabled.\n\n - exit\n\n You can now exit GDB by using the new command 'exit', in addition to\n the existing 'quit' command.\n\n - set debug threads on|off\n - show debug threads\n\n Print additional debug messages about thread creation and deletion.\n\n - set debug linux-nat on|off\n - show debug linux-nat\n\n These new commands replaced the old 'set debug lin-lwp' and 'show\n debug lin-lwp' respectively. Turning this setting on prints debug\n messages relating to GDB's handling of native Linux inferiors.\n\n - maint flush source-cache\n\n Flush the contents of the source code cache.\n\n - maint set gnu-source-highlight enabled on|off\n - maint show gnu-source-highlight enabled\n\n Whether GDB should use the GNU Source Highlight library for adding\n styling to source code. When off, the library will not be used, even\n when available. When GNU Source Highlight isn't used, or can't add\n styling to a particular source file, then the Python Pygments\n library will be used instead.\n\n - set suppress-cli-notifications (on|off)\n - show suppress-cli-notifications\n\n This controls whether printing the notifications is suppressed for CLI.\n CLI notifications occur when you change the selected context\n (i.e., the current inferior, thread and/or the frame), or when\n the program being debugged stops (e.g., because of hitting a\n breakpoint, completing source-stepping, an interrupt, etc.).\n\n - set style disassembler enabled on|off\n - show style disassembler enabled\n\n If GDB is compiled with Python support, and the Python Pygments\n package is available, then, when this setting is on, disassembler\n output will have styling applied.\n\n - set ada source-charset\n - show ada source-charset\n\n Set the character set encoding that is assumed for Ada symbols. Valid\n values for this follow the values that can be passed to the GNAT\n compiler via the '-gnati' option. The default is ISO-8859-1.\n\n* Changed commands:\n\n - print\n\n Printing of floating-point values with base-modifying formats like\n /x has been changed to display the underlying bytes of the value in\n the desired base. This was GDB's documented behavior, but was never\n implemented correctly.\n\n - maint packet\n\n This command can now print a reply, if the reply includes\n non-printable characters. Any non-printable characters are printed\n as escaped hex, e.g. \\x?? where '??' is replaces with the value of\n the non-printable character.\n\n - clone-inferior\n The clone-inferior command now ensures that the TTY, CMD and ARGS\n settings are copied from the original inferior to the new one.\n All modifications to the environment variables done using the 'set\n environment' or 'unset environment' commands are also copied to the new\n inferior.\n\n - set debug lin-lwp on|off\n - show debug lin-lwp\n\n These commands have been removed from GDB. The new command 'set\n debug linux-nat' and 'show debug linux-nat' should be used\n instead.\n\n - info win\n\n This command now includes information about the width of the tui\n windows in its output.\n\n* GDB's Ada parser now supports an extension for specifying the exact\n byte contents of a floating-point literal. This can be useful for\n setting floating-point registers to a precise value without loss of\n precision. The syntax is an extension of the based literal syntax.\n Use, e.g., '16lf#0123abcd#' -- the number of 'l's controls the width\n of the floating-point type, and the 'f' is the marker for floating\n point.\n\n* MI changes:\n\n ** The '-add-inferior' with no option flags now inherits the\n connection of the current inferior, this restores the behaviour of\n GDB as it was prior to GDB 10.\n\n ** The '-add-inferior' command now accepts a '--no-connection'\n option, which causes the new inferior to start without a\n connection.\n\n* Python API:\n\n ** New function gdb.add_history(), which takes a gdb.Value object\n and adds the value it represents to GDB's history list. An\n integer, the index of the new item in the history list, is\n returned.\n\n ** New function gdb.history_count(), which returns the number of\n values in GDB's value history.\n\n ** New gdb.events.gdb_exiting event. This event is called with a\n gdb.GdbExitingEvent object which has the read-only attribute\n 'exit_code', which contains the value of the GDB exit code. This\n event is triggered once GDB decides it is going to exit, but\n before GDB starts to clean up its internal state.\n\n ** New function gdb.architecture_names(), which returns a list\n containing all of the possible Architecture.name() values. Each\n entry is a string.\n\n ** New function gdb.Architecture.integer_type(), which returns an\n integer type given a size and a signed-ness.\n\n ** New gdb.TargetConnection object type that represents a connection\n (as displayed by the 'info connections' command). A sub-class,\n gdb.RemoteTargetConnection, is used to represent 'remote' and\n 'extended-remote' connections.\n\n ** The gdb.Inferior type now has a 'connection' property which is an\n instance of gdb.TargetConnection, the connection used by this\n inferior. This can be None if the inferior has no connection.\n\n ** New 'gdb.events.connection_removed' event registry, which emits a\n 'gdb.ConnectionEvent' when a connection is removed from GDB.\n This event has a 'connection' property, a gdb.TargetConnection\n object for the connection being removed.\n\n ** New gdb.connections() function that returns a list of all\n currently active connections.\n\n ** New gdb.RemoteTargetConnection.send_packet(PACKET) method. This\n is equivalent to the existing 'maint packet' CLI command; it\n allows a user specified packet to be sent to the remote target.\n\n ** New function gdb.host_charset(), returns a string, which is the\n name of the current host charset.\n\n ** New gdb.set_parameter(NAME, VALUE). This sets the gdb parameter\n NAME to VALUE.\n\n ** New gdb.with_parameter(NAME, VALUE). This returns a context\n manager that temporarily sets the gdb parameter NAME to VALUE,\n then resets it when the context is exited.\n\n ** The gdb.Value.format_string method now takes a 'styling'\n argument, which is a boolean. When true, the returned string can\n include escape sequences to apply styling. The styling will only\n be present if styling is otherwise turned on in GDB (see 'help\n set styling'). When false, which is the default if the argument\n is not given, then no styling is applied to the returned string.\n\n ** New read-only attribute gdb.InferiorThread.details, which is\n either a string, containing additional, target specific thread\n state information, or None, if there is no such additional\n information.\n\n ** New read-only attribute gdb.Type.is_scalar, which is True for\n scalar types, and False for all other types.\n\n ** New read-only attribute gdb.Type.is_signed. This attribute\n should only be read when Type.is_scalar is True, and will be True\n for signed types, and False for all other types. Attempting to\n read this attribute for non-scalar types will raise a ValueError.\n\n ** It is now possible to add GDB/MI commands implemented in Python.\n\n- Update libipt to v2.0.5.\n\n- CVE-2018-7208: Fixed improper bounds check in coffgen.c:coff_pointerize_aux() that allowed for denial of service when parsing a crafted COFF file (bsc#1081527).\n- CVE-2017-16829: Fixed possible remote denial of service via the _bfd_elf_parse_gnu_properties() function in elf-properties.c (bsc#1068950).\n\nBug fixes:\n\n- Fixed license (bsc#1210081).\n- Advertises RHEL version support status (bsc#1207712).\n- Fixed crashes while debugging a clang-cpp app (bsc#1192285).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-2485,SUSE-SLE-SDK-12-SP5-2023-2485,SUSE-SLE-SERVER-12-SP5-2023-2485", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2485-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:2485-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20232485-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:2485-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-June/029799.html", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1192285", url: "https://bugzilla.suse.com/1192285", }, { category: "self", summary: "SUSE Bug 1207712", url: "https://bugzilla.suse.com/1207712", }, { category: "self", summary: "SUSE Bug 1210081", url: "https://bugzilla.suse.com/1210081", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, ], title: "Security update for gdb", tracking: { current_release_date: "2023-06-12T06:54:40Z", generator: { date: "2023-06-12T06:54:40Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:2485-1", initial_release_date: "2023-06-12T06:54:40Z", revision_history: [ { date: "2023-06-12T06:54:40Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gdb-12.1-2.20.1.aarch64", product: { name: "gdb-12.1-2.20.1.aarch64", product_id: "gdb-12.1-2.20.1.aarch64", }, }, { category: "product_version", name: "gdb-testresults-12.1-2.20.1.aarch64", product: { name: "gdb-testresults-12.1-2.20.1.aarch64", product_id: "gdb-testresults-12.1-2.20.1.aarch64", }, }, { category: "product_version", name: "gdbserver-12.1-2.20.1.aarch64", product: { name: "gdbserver-12.1-2.20.1.aarch64", product_id: "gdbserver-12.1-2.20.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gdb-64bit-12.1-2.20.1.aarch64_ilp32", product: { name: "gdb-64bit-12.1-2.20.1.aarch64_ilp32", product_id: "gdb-64bit-12.1-2.20.1.aarch64_ilp32", }, }, { category: "product_version", name: "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32", product: { name: "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32", product_id: "gdbserver-64bit-12.1-2.20.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "gdb-12.1-2.20.1.i586", product: { name: "gdb-12.1-2.20.1.i586", product_id: "gdb-12.1-2.20.1.i586", }, }, { category: "product_version", name: "gdb-testresults-12.1-2.20.1.i586", product: { name: "gdb-testresults-12.1-2.20.1.i586", product_id: "gdb-testresults-12.1-2.20.1.i586", }, }, { category: "product_version", name: "gdbserver-12.1-2.20.1.i586", product: { name: "gdbserver-12.1-2.20.1.i586", product_id: "gdbserver-12.1-2.20.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "gdb-12.1-2.20.1.ppc64le", product: { name: "gdb-12.1-2.20.1.ppc64le", product_id: "gdb-12.1-2.20.1.ppc64le", }, }, { category: "product_version", name: "gdb-testresults-12.1-2.20.1.ppc64le", product: { name: "gdb-testresults-12.1-2.20.1.ppc64le", product_id: "gdb-testresults-12.1-2.20.1.ppc64le", }, }, { category: "product_version", name: "gdbserver-12.1-2.20.1.ppc64le", product: { name: "gdbserver-12.1-2.20.1.ppc64le", product_id: "gdbserver-12.1-2.20.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gdb-12.1-2.20.1.s390", product: { name: "gdb-12.1-2.20.1.s390", product_id: "gdb-12.1-2.20.1.s390", }, }, { category: "product_version", name: "gdb-testresults-12.1-2.20.1.s390", product: { name: "gdb-testresults-12.1-2.20.1.s390", product_id: "gdb-testresults-12.1-2.20.1.s390", }, }, { category: "product_version", name: "gdbserver-12.1-2.20.1.s390", product: { name: "gdbserver-12.1-2.20.1.s390", product_id: "gdbserver-12.1-2.20.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "gdb-12.1-2.20.1.s390x", product: { name: "gdb-12.1-2.20.1.s390x", product_id: "gdb-12.1-2.20.1.s390x", }, }, { category: "product_version", name: "gdb-32bit-12.1-2.20.1.s390x", product: { name: "gdb-32bit-12.1-2.20.1.s390x", product_id: "gdb-32bit-12.1-2.20.1.s390x", }, }, { category: "product_version", name: "gdb-testresults-12.1-2.20.1.s390x", product: { name: "gdb-testresults-12.1-2.20.1.s390x", product_id: "gdb-testresults-12.1-2.20.1.s390x", }, }, { category: "product_version", name: "gdbserver-12.1-2.20.1.s390x", product: { name: "gdbserver-12.1-2.20.1.s390x", product_id: "gdbserver-12.1-2.20.1.s390x", }, }, { category: "product_version", name: "gdbserver-32bit-12.1-2.20.1.s390x", product: { name: "gdbserver-32bit-12.1-2.20.1.s390x", product_id: "gdbserver-32bit-12.1-2.20.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gdb-12.1-2.20.1.x86_64", product: { name: "gdb-12.1-2.20.1.x86_64", product_id: "gdb-12.1-2.20.1.x86_64", }, }, { category: "product_version", name: "gdb-testresults-12.1-2.20.1.x86_64", product: { name: "gdb-testresults-12.1-2.20.1.x86_64", product_id: "gdb-testresults-12.1-2.20.1.x86_64", }, }, { category: "product_version", name: "gdbserver-12.1-2.20.1.x86_64", product: { name: "gdbserver-12.1-2.20.1.x86_64", product_id: "gdbserver-12.1-2.20.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", }, product_reference: "gdbserver-12.1-2.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", }, product_reference: "gdbserver-12.1-2.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", }, product_reference: "gdbserver-12.1-2.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", }, product_reference: "gdbserver-12.1-2.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-32bit-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", }, product_reference: "gdbserver-32bit-12.1-2.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", }, product_reference: "gdb-12.1-2.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", }, product_reference: "gdb-12.1-2.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", }, product_reference: "gdb-12.1-2.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", }, product_reference: "gdb-12.1-2.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", }, product_reference: "gdb-12.1-2.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", }, product_reference: "gdb-12.1-2.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", }, product_reference: "gdb-12.1-2.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-12.1-2.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", }, product_reference: "gdb-12.1-2.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-06-12T06:54:40Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-12.1-2.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-12.1-2.20.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-06-12T06:54:40Z", details: "low", }, ], title: "CVE-2018-7208", }, ], }
suse-su-2024:0898-1
Vulnerability from csaf_suse
Published
2024-03-14 15:05
Modified
2024-03-14 15:05
Summary
Security update for gdb
Notes
Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues:
- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't
needed because there's a build requirement on libdebuginfod-devel
already, which will pull the shared library. And the latter,
because it's bogus since RPM auto generated dependency will take
care of that requirement.
gdb was released in 13.2:
* This version of GDB includes the following changes and enhancements:
* Support for the following new targets has been added in both GDB and GDBserver:
* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*
* The Windows native target now supports target async.
* Floating-point support has now been added on LoongArch GNU/Linux.
* New commands:
* set print nibbles [on|off]
* show print nibbles
* This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details.
* Python API improvements:
* New Python API for instruction disassembly.
* The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '
* New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.
* New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the frame's language.
* gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.
* gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
* The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9].
* GDB/MI changes:
* MI version 1 is deprecated, and will be removed in GDB 14.
* The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno.
* Miscellaneous improvements:
* gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.
* New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.
* The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.
* The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.
* A new format '/b' has been introduce to provide the old behavior of '/r'.
* The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.
* It is now possible to use the 'document' command to document user-defined commands.
* Support for memory tag data for AArch64 MTE.
* Support Removal notices:
* DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.
* Support for the following commands has been removed:
* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv
* Use the 'set/show debug solib' commands instead.
See the NEWS file for a more complete and detailed list of what this release includes.
Patchnames
SUSE-2024-898,SUSE-SLE-Module-Development-Tools-15-SP5-2024-898,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-898,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-898,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-898,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-898,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-898,openSUSE-SLE-15.5-2024-898
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for gdb", title: "Title of the patch", }, { category: "description", text: "This update for gdb fixes the following issues:\n\n- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't\n needed because there's a build requirement on libdebuginfod-devel\n already, which will pull the shared library. And the latter,\n because it's bogus since RPM auto generated dependency will take\n care of that requirement.\n\ngdb was released in 13.2:\n\n* This version of GDB includes the following changes and enhancements:\n\n * Support for the following new targets has been added in both GDB and GDBserver:\n\n * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*\n * GNU/Linux/CSKY (gdbserver) csky*-*linux* \n\n * The Windows native target now supports target async.\n * Floating-point support has now been added on LoongArch GNU/Linux.\n * New commands:\n\n * set print nibbles [on|off]\n * show print nibbles\n\n * This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.\n Various styling-related commands. See the gdb/NEWS file for more details.\n Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. \n\n * Python API improvements:\n\n * New Python API for instruction disassembly.\n\n * The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.\n * New Python type gdb.BreakpointLocation.\n * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '\n * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.\n * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.\n * New method gdb.Frame.language that returns the name of the frame's language.\n * gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.\n * gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.\n * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9]. \n * GDB/MI changes:\n\n * MI version 1 is deprecated, and will be removed in GDB 14.\n * The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno. \n\n * Miscellaneous improvements:\n\n * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.\n * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.\n * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.\n * The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.\n * The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.\n\n * A new format '/b' has been introduce to provide the old behavior of '/r'.\n * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.\n * It is now possible to use the 'document' command to document user-defined commands.\n * Support for memory tag data for AArch64 MTE. \n\n * Support Removal notices:\n\n * DBX mode has been removed.\n * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.\n * Support for the following commands has been removed:\n\n * set debug aix-solib on|off\n * show debug aix-solib\n * set debug solib-frv on|off\n * show debug solib-frv\n\n * Use the 'set/show debug solib' commands instead. \n\nSee the NEWS file for a more complete and detailed list of what this release includes. \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-898,SUSE-SLE-Module-Development-Tools-15-SP5-2024-898,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-898,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-898,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-898,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-898,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-898,openSUSE-SLE-15.5-2024-898", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0898-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0898-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240898-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0898-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018169.html", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1211052", url: "https://bugzilla.suse.com/1211052", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2022-48064 page", url: "https://www.suse.com/security/cve/CVE-2022-48064/", }, ], title: "Security update for gdb", tracking: { current_release_date: "2024-03-14T15:05:17Z", generator: { date: "2024-03-14T15:05:17Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0898-1", initial_release_date: "2024-03-14T15:05:17Z", revision_history: [ { date: "2024-03-14T15:05:17Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gdb-13.2-150400.15.14.1.aarch64", product: { name: "gdb-13.2-150400.15.14.1.aarch64", product_id: "gdb-13.2-150400.15.14.1.aarch64", }, }, { category: "product_version", name: "gdb-testresults-13.2-150400.15.14.4.aarch64", product: { name: "gdb-testresults-13.2-150400.15.14.4.aarch64", product_id: "gdb-testresults-13.2-150400.15.14.4.aarch64", }, }, { category: "product_version", name: "gdbserver-13.2-150400.15.14.1.aarch64", product: { name: "gdbserver-13.2-150400.15.14.1.aarch64", product_id: "gdbserver-13.2-150400.15.14.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gdb-64bit-13.2-150400.15.14.1.aarch64_ilp32", product: { name: "gdb-64bit-13.2-150400.15.14.1.aarch64_ilp32", product_id: "gdb-64bit-13.2-150400.15.14.1.aarch64_ilp32", }, }, { category: "product_version", name: "gdbserver-64bit-13.2-150400.15.14.1.aarch64_ilp32", product: { name: "gdbserver-64bit-13.2-150400.15.14.1.aarch64_ilp32", product_id: "gdbserver-64bit-13.2-150400.15.14.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "gdb-13.2-150400.15.14.1.i586", product: { name: "gdb-13.2-150400.15.14.1.i586", product_id: "gdb-13.2-150400.15.14.1.i586", }, }, { category: "product_version", name: "gdb-testresults-13.2-150400.15.14.4.i586", product: { name: "gdb-testresults-13.2-150400.15.14.4.i586", product_id: "gdb-testresults-13.2-150400.15.14.4.i586", }, }, { category: "product_version", name: "gdbserver-13.2-150400.15.14.1.i586", product: { name: "gdbserver-13.2-150400.15.14.1.i586", product_id: "gdbserver-13.2-150400.15.14.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "gdb-13.2-150400.15.14.1.ppc64le", product: { name: "gdb-13.2-150400.15.14.1.ppc64le", product_id: "gdb-13.2-150400.15.14.1.ppc64le", }, }, { category: "product_version", name: "gdb-testresults-13.2-150400.15.14.4.ppc64le", product: { name: "gdb-testresults-13.2-150400.15.14.4.ppc64le", product_id: "gdb-testresults-13.2-150400.15.14.4.ppc64le", }, }, { category: "product_version", name: "gdbserver-13.2-150400.15.14.1.ppc64le", product: { name: "gdbserver-13.2-150400.15.14.1.ppc64le", product_id: "gdbserver-13.2-150400.15.14.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gdb-13.2-150400.15.14.1.s390x", product: { name: "gdb-13.2-150400.15.14.1.s390x", product_id: "gdb-13.2-150400.15.14.1.s390x", }, }, { category: "product_version", name: "gdb-testresults-13.2-150400.15.14.4.s390x", product: { name: "gdb-testresults-13.2-150400.15.14.4.s390x", product_id: "gdb-testresults-13.2-150400.15.14.4.s390x", }, }, { category: "product_version", name: "gdbserver-13.2-150400.15.14.1.s390x", product: { name: "gdbserver-13.2-150400.15.14.1.s390x", product_id: "gdbserver-13.2-150400.15.14.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gdb-13.2-150400.15.14.1.x86_64", product: { name: "gdb-13.2-150400.15.14.1.x86_64", product_id: "gdb-13.2-150400.15.14.1.x86_64", }, }, { category: "product_version", name: "gdb-testresults-13.2-150400.15.14.4.x86_64", product: { name: "gdb-testresults-13.2-150400.15.14.4.x86_64", product_id: "gdb-testresults-13.2-150400.15.14.4.x86_64", }, }, { category: "product_version", name: "gdbserver-13.2-150400.15.14.1.x86_64", product: { name: "gdbserver-13.2-150400.15.14.1.x86_64", product_id: "gdbserver-13.2-150400.15.14.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", }, product_reference: "gdb-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdb-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", }, product_reference: "gdb-13.2-150400.15.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", }, product_reference: "gdb-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", }, product_reference: "gdbserver-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdbserver-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", }, product_reference: "gdbserver-13.2-150400.15.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", }, product_reference: "gdbserver-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", }, product_reference: "gdb-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", }, product_reference: "gdb-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", }, product_reference: "gdbserver-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", }, product_reference: "gdbserver-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", }, product_reference: "gdb-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", }, product_reference: "gdb-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", }, product_reference: "gdbserver-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", }, product_reference: "gdbserver-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", }, product_reference: "gdb-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdb-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", }, product_reference: "gdb-13.2-150400.15.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", }, product_reference: "gdb-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", }, product_reference: "gdbserver-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdbserver-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", }, product_reference: "gdbserver-13.2-150400.15.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", }, product_reference: "gdbserver-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdb-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", }, product_reference: "gdb-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdbserver-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", }, product_reference: "gdbserver-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", }, product_reference: "gdb-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdb-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", }, product_reference: "gdb-13.2-150400.15.14.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150400.15.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", }, product_reference: "gdb-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-testresults-13.2-150400.15.14.4.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", }, product_reference: "gdb-testresults-13.2-150400.15.14.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-testresults-13.2-150400.15.14.4.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", }, product_reference: "gdb-testresults-13.2-150400.15.14.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-testresults-13.2-150400.15.14.4.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", }, product_reference: "gdb-testresults-13.2-150400.15.14.4.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdb-testresults-13.2-150400.15.14.4.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", }, product_reference: "gdb-testresults-13.2-150400.15.14.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", }, product_reference: "gdbserver-13.2-150400.15.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", }, product_reference: "gdbserver-13.2-150400.15.14.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", }, product_reference: "gdbserver-13.2-150400.15.14.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150400.15.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", }, product_reference: "gdbserver-13.2-150400.15.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-03-14T15:05:17Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-03-14T15:05:17Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2022-48064", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48064", }, ], notes: [ { category: "general", text: "GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48064", url: "https://www.suse.com/security/cve/CVE-2022-48064", }, { category: "external", summary: "SUSE Bug 1214619 for CVE-2022-48064", url: "https://bugzilla.suse.com/1214619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:gdbserver-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdb-13.2-150400.15.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gdbserver-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdb-13.2-150400.15.14.1.x86_64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.aarch64", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.ppc64le", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.s390x", "openSUSE Leap 15.5:gdb-testresults-13.2-150400.15.14.4.x86_64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.aarch64", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.ppc64le", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.s390x", "openSUSE Leap 15.5:gdbserver-13.2-150400.15.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-03-14T15:05:17Z", details: "low", }, ], title: "CVE-2022-48064", }, ], }
suse-su-2024:0319-1
Vulnerability from csaf_suse
Published
2024-02-20 16:52
Modified
2024-02-20 16:52
Summary
Security update for gdb
Notes
Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues:
- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't
needed because there's a build requirement on libdebuginfod-devel
already, which will pull the shared library. And the latter,
because it's bogus since RPM auto generated dependency will take
care of that requirement.
gdb was released in 13.2:
* This version of GDB includes the following changes and enhancements:
* Support for the following new targets has been added in both GDB and GDBserver:
* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*
* The Windows native target now supports target async.
* Floating-point support has now been added on LoongArch GNU/Linux.
* New commands:
* set print nibbles [on|off]
* show print nibbles
* This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details.
* Python API improvements:
* New Python API for instruction disassembly.
* The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '
* New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.
* New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the frame's language.
* gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.
* gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
* The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9].
* GDB/MI changes:
* MI version 1 is deprecated, and will be removed in GDB 14.
* The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno.
* Miscellaneous improvements:
* gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.
* New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.
* The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.
* The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.
* A new format '/b' has been introduce to provide the old behavior of '/r'.
* The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.
* It is now possible to use the 'document' command to document user-defined commands.
* Support for memory tag data for AArch64 MTE.
* Support Removal notices:
* DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.
* Support for the following commands has been removed:
* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv
* Use the 'set/show debug solib' commands instead.
See the NEWS file for a more complete and detailed list of what this release includes.
Patchnames
SUSE-2024-319,SUSE-SLE-SDK-12-SP5-2024-319,SUSE-SLE-SERVER-12-SP5-2024-319
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for gdb", title: "Title of the patch", }, { category: "description", text: "This update for gdb fixes the following issues:\n\n- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't\n needed because there's a build requirement on libdebuginfod-devel\n already, which will pull the shared library. And the latter,\n because it's bogus since RPM auto generated dependency will take\n care of that requirement.\n\ngdb was released in 13.2:\n\n* This version of GDB includes the following changes and enhancements:\n\n * Support for the following new targets has been added in both GDB and GDBserver:\n\n * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*\n * GNU/Linux/CSKY (gdbserver) csky*-*linux* \n\n * The Windows native target now supports target async.\n * Floating-point support has now been added on LoongArch GNU/Linux.\n * New commands:\n\n * set print nibbles [on|off]\n * show print nibbles\n\n * This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.\n Various styling-related commands. See the gdb/NEWS file for more details.\n Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. \n\n * Python API improvements:\n\n * New Python API for instruction disassembly.\n\n * The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.\n * New Python type gdb.BreakpointLocation.\n * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '\n * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.\n * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.\n * New method gdb.Frame.language that returns the name of the frame's language.\n * gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.\n * gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.\n * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9]. \n * GDB/MI changes:\n\n * MI version 1 is deprecated, and will be removed in GDB 14.\n * The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno. \n\n * Miscellaneous improvements:\n\n * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.\n * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.\n * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.\n * The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.\n * The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.\n\n * A new format '/b' has been introduce to provide the old behavior of '/r'.\n * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.\n * It is now possible to use the 'document' command to document user-defined commands.\n * Support for memory tag data for AArch64 MTE. \n\n * Support Removal notices:\n\n * DBX mode has been removed.\n * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.\n * Support for the following commands has been removed:\n\n * set debug aix-solib on|off\n * show debug aix-solib\n * set debug solib-frv on|off\n * show debug solib-frv\n\n * Use the 'set/show debug solib' commands instead. \n\nSee the NEWS file for a more complete and detailed list of what this release includes. \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-319,SUSE-SLE-SDK-12-SP5-2024-319,SUSE-SLE-SERVER-12-SP5-2024-319", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0319-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0319-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240319-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0319-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017848.html", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1211052", url: "https://bugzilla.suse.com/1211052", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2022-48064 page", url: "https://www.suse.com/security/cve/CVE-2022-48064/", }, ], title: "Security update for gdb", tracking: { current_release_date: "2024-02-20T16:52:21Z", generator: { date: "2024-02-20T16:52:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0319-1", initial_release_date: "2024-02-20T16:52:21Z", revision_history: [ { date: "2024-02-20T16:52:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gdb-13.2-2.23.1.aarch64", product: { name: "gdb-13.2-2.23.1.aarch64", product_id: "gdb-13.2-2.23.1.aarch64", }, }, { category: "product_version", name: "gdb-testresults-13.2-2.23.1.aarch64", product: { name: "gdb-testresults-13.2-2.23.1.aarch64", product_id: "gdb-testresults-13.2-2.23.1.aarch64", }, }, { category: "product_version", name: "gdbserver-13.2-2.23.1.aarch64", product: { name: "gdbserver-13.2-2.23.1.aarch64", product_id: "gdbserver-13.2-2.23.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gdb-64bit-13.2-2.23.1.aarch64_ilp32", product: { name: "gdb-64bit-13.2-2.23.1.aarch64_ilp32", product_id: "gdb-64bit-13.2-2.23.1.aarch64_ilp32", }, }, { category: "product_version", name: "gdbserver-64bit-13.2-2.23.1.aarch64_ilp32", product: { name: "gdbserver-64bit-13.2-2.23.1.aarch64_ilp32", product_id: "gdbserver-64bit-13.2-2.23.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "gdb-13.2-2.23.1.i586", product: { name: "gdb-13.2-2.23.1.i586", product_id: "gdb-13.2-2.23.1.i586", }, }, { category: "product_version", name: "gdb-testresults-13.2-2.23.1.i586", product: { name: "gdb-testresults-13.2-2.23.1.i586", product_id: "gdb-testresults-13.2-2.23.1.i586", }, }, { category: "product_version", name: "gdbserver-13.2-2.23.1.i586", product: { name: "gdbserver-13.2-2.23.1.i586", product_id: "gdbserver-13.2-2.23.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "gdb-13.2-2.23.1.ppc64le", product: { name: "gdb-13.2-2.23.1.ppc64le", product_id: "gdb-13.2-2.23.1.ppc64le", }, }, { category: "product_version", name: "gdb-testresults-13.2-2.23.1.ppc64le", product: { name: "gdb-testresults-13.2-2.23.1.ppc64le", product_id: "gdb-testresults-13.2-2.23.1.ppc64le", }, }, { category: "product_version", name: "gdbserver-13.2-2.23.1.ppc64le", product: { name: "gdbserver-13.2-2.23.1.ppc64le", product_id: "gdbserver-13.2-2.23.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gdb-13.2-2.23.1.s390", product: { name: "gdb-13.2-2.23.1.s390", product_id: "gdb-13.2-2.23.1.s390", }, }, { category: "product_version", name: "gdb-testresults-13.2-2.23.1.s390", product: { name: "gdb-testresults-13.2-2.23.1.s390", product_id: "gdb-testresults-13.2-2.23.1.s390", }, }, { category: "product_version", name: "gdbserver-13.2-2.23.1.s390", product: { name: "gdbserver-13.2-2.23.1.s390", product_id: "gdbserver-13.2-2.23.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "gdb-13.2-2.23.1.s390x", product: { name: "gdb-13.2-2.23.1.s390x", product_id: "gdb-13.2-2.23.1.s390x", }, }, { category: "product_version", name: "gdb-32bit-13.2-2.23.1.s390x", product: { name: "gdb-32bit-13.2-2.23.1.s390x", product_id: "gdb-32bit-13.2-2.23.1.s390x", }, }, { category: "product_version", name: "gdb-testresults-13.2-2.23.1.s390x", product: { name: "gdb-testresults-13.2-2.23.1.s390x", product_id: "gdb-testresults-13.2-2.23.1.s390x", }, }, { category: "product_version", name: "gdbserver-13.2-2.23.1.s390x", product: { name: "gdbserver-13.2-2.23.1.s390x", product_id: "gdbserver-13.2-2.23.1.s390x", }, }, { category: "product_version", name: "gdbserver-32bit-13.2-2.23.1.s390x", product: { name: "gdbserver-32bit-13.2-2.23.1.s390x", product_id: "gdbserver-32bit-13.2-2.23.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gdb-13.2-2.23.1.x86_64", product: { name: "gdb-13.2-2.23.1.x86_64", product_id: "gdb-13.2-2.23.1.x86_64", }, }, { category: "product_version", name: "gdb-testresults-13.2-2.23.1.x86_64", product: { name: "gdb-testresults-13.2-2.23.1.x86_64", product_id: "gdb-testresults-13.2-2.23.1.x86_64", }, }, { category: "product_version", name: "gdbserver-13.2-2.23.1.x86_64", product: { name: "gdbserver-13.2-2.23.1.x86_64", product_id: "gdbserver-13.2-2.23.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-2.23.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", }, product_reference: "gdbserver-13.2-2.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-2.23.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", }, product_reference: "gdbserver-13.2-2.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", }, product_reference: "gdbserver-13.2-2.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-2.23.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", }, product_reference: "gdbserver-13.2-2.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdbserver-32bit-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", }, product_reference: "gdbserver-32bit-13.2-2.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", }, product_reference: "gdb-13.2-2.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", }, product_reference: "gdb-13.2-2.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", }, product_reference: "gdb-13.2-2.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", }, product_reference: "gdb-13.2-2.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", }, product_reference: "gdb-13.2-2.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", }, product_reference: "gdb-13.2-2.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", }, product_reference: "gdb-13.2-2.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-2.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", }, product_reference: "gdb-13.2-2.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, ], threats: [ { category: "impact", date: "2024-02-20T16:52:21Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, ], threats: [ { category: "impact", date: "2024-02-20T16:52:21Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2022-48064", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48064", }, ], notes: [ { category: "general", text: "GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2022-48064", url: "https://www.suse.com/security/cve/CVE-2022-48064", }, { category: "external", summary: "SUSE Bug 1214619 for CVE-2022-48064", url: "https://bugzilla.suse.com/1214619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gdb-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-13.2-2.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:gdbserver-32bit-13.2-2.23.1.s390x", ], }, ], threats: [ { category: "impact", date: "2024-02-20T16:52:21Z", details: "low", }, ], title: "CVE-2022-48064", }, ], }
suse-su-2024:0899-1
Vulnerability from csaf_suse
Published
2024-03-14 15:09
Modified
2024-03-14 15:09
Summary
Security update for gdb
Notes
Title of the patch
Security update for gdb
Description of the patch
This update for gdb fixes the following issues:
- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't
needed because there's a build requirement on libdebuginfod-devel
already, which will pull the shared library. And the latter,
because it's bogus since RPM auto generated dependency will take
care of that requirement.
gdb was released in 13.2:
* This version of GDB includes the following changes and enhancements:
* Support for the following new targets has been added in both GDB and GDBserver:
* GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
* GNU/Linux/CSKY (gdbserver) csky*-*linux*
* The Windows native target now supports target async.
* Floating-point support has now been added on LoongArch GNU/Linux.
* New commands:
* set print nibbles [on|off]
* show print nibbles
* This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.
Various styling-related commands. See the gdb/NEWS file for more details.
Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details.
* Python API improvements:
* New Python API for instruction disassembly.
* The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
* New Python type gdb.BreakpointLocation.
* New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '
* New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.
* New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.
* New method gdb.Frame.language that returns the name of the frame's language.
* gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.
* gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
* The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9].
* GDB/MI changes:
* MI version 1 is deprecated, and will be removed in GDB 14.
* The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno.
* Miscellaneous improvements:
* gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.
* New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.
* New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.
* The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.
* The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.
* A new format '/b' has been introduce to provide the old behavior of '/r'.
* The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.
* It is now possible to use the 'document' command to document user-defined commands.
* Support for memory tag data for AArch64 MTE.
* Support Removal notices:
* DBX mode has been removed.
* Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.
* Support for the following commands has been removed:
* set debug aix-solib on|off
* show debug aix-solib
* set debug solib-frv on|off
* show debug solib-frv
* Use the 'set/show debug solib' commands instead.
See the NEWS file for a more complete and detailed list of what this release includes.
Patchnames
SUSE-2024-899,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-899,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-899,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-899,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-899,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-899,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-899,SUSE-Storage-7.1-2024-899
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for gdb", title: "Title of the patch", }, { category: "description", text: "This update for gdb fixes the following issues:\n\n- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't\n needed because there's a build requirement on libdebuginfod-devel\n already, which will pull the shared library. And the latter,\n because it's bogus since RPM auto generated dependency will take\n care of that requirement.\n\ngdb was released in 13.2:\n\n* This version of GDB includes the following changes and enhancements:\n\n * Support for the following new targets has been added in both GDB and GDBserver:\n\n * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*\n * GNU/Linux/CSKY (gdbserver) csky*-*linux* \n\n * The Windows native target now supports target async.\n * Floating-point support has now been added on LoongArch GNU/Linux.\n * New commands:\n\n * set print nibbles [on|off]\n * show print nibbles\n\n * This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.\n Various styling-related commands. See the gdb/NEWS file for more details.\n Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. \n\n * Python API improvements:\n\n * New Python API for instruction disassembly.\n\n * The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.\n * New Python type gdb.BreakpointLocation.\n * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '\n * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.\n * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.\n * New method gdb.Frame.language that returns the name of the frame's language.\n * gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.\n * gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.\n * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9]. \n * GDB/MI changes:\n\n * MI version 1 is deprecated, and will be removed in GDB 14.\n * The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno. \n\n * Miscellaneous improvements:\n\n * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.\n * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.\n * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.\n * The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.\n * The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.\n\n * A new format '/b' has been introduce to provide the old behavior of '/r'.\n * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.\n * It is now possible to use the 'document' command to document user-defined commands.\n * Support for memory tag data for AArch64 MTE. \n\n * Support Removal notices:\n\n * DBX mode has been removed.\n * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.\n * Support for the following commands has been removed:\n\n * set debug aix-solib on|off\n * show debug aix-solib\n * set debug solib-frv on|off\n * show debug solib-frv\n\n * Use the 'set/show debug solib' commands instead. \n\nSee the NEWS file for a more complete and detailed list of what this release includes. \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-899,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-899,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-899,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-899,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-899,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-899,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-899,SUSE-Storage-7.1-2024-899", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0899-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0899-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240899-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0899-1", url: "https://lists.suse.com/pipermail/sle-updates/2024-March/034658.html", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1211052", url: "https://bugzilla.suse.com/1211052", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2022-48064 page", url: "https://www.suse.com/security/cve/CVE-2022-48064/", }, ], title: "Security update for gdb", tracking: { current_release_date: "2024-03-14T15:09:54Z", generator: { date: "2024-03-14T15:09:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0899-1", initial_release_date: "2024-03-14T15:09:54Z", revision_history: [ { date: "2024-03-14T15:09:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gdb-13.2-150100.8.39.1.aarch64", product: { name: "gdb-13.2-150100.8.39.1.aarch64", product_id: "gdb-13.2-150100.8.39.1.aarch64", }, }, { category: "product_version", name: "gdb-testresults-13.2-150100.8.39.2.aarch64", product: { name: "gdb-testresults-13.2-150100.8.39.2.aarch64", product_id: "gdb-testresults-13.2-150100.8.39.2.aarch64", }, }, { category: "product_version", name: "gdbserver-13.2-150100.8.39.1.aarch64", product: { name: "gdbserver-13.2-150100.8.39.1.aarch64", product_id: "gdbserver-13.2-150100.8.39.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gdb-64bit-13.2-150100.8.39.1.aarch64_ilp32", product: { name: "gdb-64bit-13.2-150100.8.39.1.aarch64_ilp32", product_id: "gdb-64bit-13.2-150100.8.39.1.aarch64_ilp32", }, }, { category: "product_version", name: "gdbserver-64bit-13.2-150100.8.39.1.aarch64_ilp32", product: { name: "gdbserver-64bit-13.2-150100.8.39.1.aarch64_ilp32", product_id: "gdbserver-64bit-13.2-150100.8.39.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "gdb-13.2-150100.8.39.1.i586", product: { name: "gdb-13.2-150100.8.39.1.i586", product_id: "gdb-13.2-150100.8.39.1.i586", }, }, { category: "product_version", name: "gdb-testresults-13.2-150100.8.39.2.i586", product: { name: "gdb-testresults-13.2-150100.8.39.2.i586", product_id: "gdb-testresults-13.2-150100.8.39.2.i586", }, }, { category: "product_version", name: "gdbserver-13.2-150100.8.39.1.i586", product: { name: "gdbserver-13.2-150100.8.39.1.i586", product_id: "gdbserver-13.2-150100.8.39.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "gdb-13.2-150100.8.39.1.ppc64le", product: { name: "gdb-13.2-150100.8.39.1.ppc64le", product_id: "gdb-13.2-150100.8.39.1.ppc64le", }, }, { category: "product_version", name: "gdb-testresults-13.2-150100.8.39.2.ppc64le", product: { name: "gdb-testresults-13.2-150100.8.39.2.ppc64le", product_id: "gdb-testresults-13.2-150100.8.39.2.ppc64le", }, }, { category: "product_version", name: "gdbserver-13.2-150100.8.39.1.ppc64le", product: { name: "gdbserver-13.2-150100.8.39.1.ppc64le", product_id: "gdbserver-13.2-150100.8.39.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gdb-13.2-150100.8.39.1.s390x", product: { name: "gdb-13.2-150100.8.39.1.s390x", product_id: "gdb-13.2-150100.8.39.1.s390x", }, }, { category: "product_version", name: "gdb-testresults-13.2-150100.8.39.2.s390x", product: { name: "gdb-testresults-13.2-150100.8.39.2.s390x", product_id: "gdb-testresults-13.2-150100.8.39.2.s390x", }, }, { category: "product_version", name: "gdbserver-13.2-150100.8.39.1.s390x", product: { name: "gdbserver-13.2-150100.8.39.1.s390x", product_id: "gdbserver-13.2-150100.8.39.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gdb-13.2-150100.8.39.1.x86_64", product: { name: "gdb-13.2-150100.8.39.1.x86_64", product_id: "gdb-13.2-150100.8.39.1.x86_64", }, }, { category: "product_version", name: "gdb-testresults-13.2-150100.8.39.2.x86_64", product: { name: "gdb-testresults-13.2-150100.8.39.2.x86_64", product_id: "gdb-testresults-13.2-150100.8.39.2.x86_64", }, }, { category: "product_version", name: "gdbserver-13.2-150100.8.39.1.x86_64", product: { name: "gdbserver-13.2-150100.8.39.1.x86_64", product_id: "gdbserver-13.2-150100.8.39.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", }, product_reference: "gdb-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", }, product_reference: "gdbserver-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", }, product_reference: "gdb-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", }, product_reference: "gdbserver-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", }, product_reference: "gdb-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdb-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", }, product_reference: "gdb-13.2-150100.8.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", }, product_reference: "gdbserver-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdbserver-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", }, product_reference: "gdbserver-13.2-150100.8.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", }, product_reference: "gdb-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdb-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", }, product_reference: "gdb-13.2-150100.8.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", }, product_reference: "gdbserver-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdbserver-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", }, product_reference: "gdbserver-13.2-150100.8.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdb-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdbserver-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdb-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", }, product_reference: "gdbserver-13.2-150100.8.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", }, product_reference: "gdb-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "gdb-13.2-150100.8.39.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", }, product_reference: "gdb-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", }, product_reference: "gdbserver-13.2-150100.8.39.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "gdbserver-13.2-150100.8.39.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", }, product_reference: "gdbserver-13.2-150100.8.39.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-03-14T15:09:54Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-03-14T15:09:54Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2022-48064", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48064", }, ], notes: [ { category: "general", text: "GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48064", url: "https://www.suse.com/security/cve/CVE-2022-48064", }, { category: "external", summary: "SUSE Bug 1214619 for CVE-2022-48064", url: "https://bugzilla.suse.com/1214619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdb-13.2-150100.8.39.1.x86_64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Enterprise Storage 7.1:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gdbserver-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdb-13.2-150100.8.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gdbserver-13.2-150100.8.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-03-14T15:09:54Z", details: "low", }, ], title: "CVE-2022-48064", }, ], }
suse-su-2018:3170-1
Vulnerability from csaf_suse
Published
2018-10-16 13:35
Modified
2018-10-16 13:35
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils to version 2.31 fixes the following issues:
These security issues were fixed:
- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
(excessive memory allocation) or possibly have unspecified other impact via a
crafted ELF file that triggered a buffer overflow on fuzzed archive header
(bsc#1065643)
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
NULL files in a .debug_line file table, which allowed remote attackers to cause
a denial of service (NULL pointer dereference and application crash) via a
crafted ELF file, related to concat_filename (bsc#1065689)
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
file, which allowed remote attackers to cause a denial of service
(find_abstract_instance_name invalid memory read, segmentation fault, and
application crash) (bsc#1065693)
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (invalid memory access and application crash) or possibly have
unspecified other impact via a crafted PE file (bsc#1068640)
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
Descriptor (BFD) library (aka libbfd) did not validate size and offset values
in the data dictionary, which allowed remote attackers to cause a denial of
service (segmentation violation and application crash) or possibly have
unspecified other impact via a crafted PE file (bsc#1068643)
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
validate the symbol count, which allowed remote attackers to cause a denial of
service (integer overflow and application crash, or excessive memory
allocation) or possibly have unspecified other impact via a crafted PE file
(bsc#1068887)
- CVE-2017-16830: The print_gnu_property_note function did not have
integer-overflow protection on 32-bit platforms, which allowed remote attackers
to cause a denial of service (segmentation violation and application crash) or
possibly have unspecified other impact via a crafted ELF file (bsc#1068888)
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
allowed remote attackers to cause a denial of service (out-of-bounds read and
application crash) or possibly have unspecified other impact via a crafted ELF
file (bsc#1068950)
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
cause a denial of service (integer overflow and heap-based buffer over-read,
and application crash) or possibly have unspecified other impact via a crafted
ELF file (bsc#1069176)
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
denial of service (slurp_symtab invalid free and application crash) or possibly
have unspecified other impact via a crafted ELF file (bsc#1069202)
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
library (aka libbfd) had an unsigned integer overflow because bfd_size_type
multiplication is not used. A crafted ELF file allowed remote attackers to
cause a denial of service (application crash) or possibly have unspecified
other impact (bsc#1077745)
- CVE-2018-6543: Prevent integer overflow in the function
load_specific_debug_section() which resulted in `malloc()` with 0 size. A
crafted ELF file allowed remote attackers to cause a denial of service
(application crash) or possibly have unspecified other impact (bsc#1079103)
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
Remote attackers could have leveraged this vulnerability to cause a denial of
service (segmentation fault) via a crafted ELF file (bsc#1079741)
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (out-of-bounds read and segmentation violation) via a note with a large
alignment (bsc#1080556)
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
remote attackers to cause a denial of service (segmentation fault) or possibly
have unspecified other impact via a crafted file, as demonstrated by objcopy of
a COFF object (bsc#1081527)
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
to cause a denial of service (NULL pointer dereference and application crash)
via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
demonstrated by objcopy (bsc#1083528)
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
remote attackers to cause a denial of service (integer underflow or overflow,
and application crash) via an ELF file with a corrupt DWARF FORM block, as
demonstrated by nm (bsc#1083532)
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
denial of service (segmentation fault) via a large attribute section
(bsc#1086608)
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
cause a denial of service (integer overflow and application crash) or possibly
have unspecified other impact via a crafted ELF file, as demonstrated by
objdump (bsc#1086784)
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
(BFD) library (aka libbfd) allowed remote attackers to cause a denial of
service (aout_32_swap_std_reloc_out NULL pointer dereference and application
crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786)
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
library (aka libbfd) allowed remote attackers to cause a denial of service
(integer overflow and application crash) via an ELF file with corrupt dwarf1
debug information, as demonstrated by nm (bsc#1086788)
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
(aka libbfd) allowed remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted binary file, as
demonstrated by nm-new (bsc#1090997)
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
denial of service (heap-based buffer over-read and application crash) via a
crafted binary file, as demonstrated by readelf (bsc#1091015)
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
(BFD) library (aka libbfd) did not validate the output_section pointer in the
case of a symtab entry with a 'SECTION' type that has a '0' value, which
allowed remote attackers to cause a denial of service (NULL pointer dereference
and application crash) via a crafted file, as demonstrated by objcopy
(bsc#1091365)
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
Directory size with an unbounded loop that increased the value of
(external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
memory region, resulting in an out-of-bounds memory write, as demonstrated by
objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
in pex64igen.c (bsc#1091368)
These non-security issues were fixed:
- The AArch64 port now supports showing disassembly notes which are emitted
when inconsistencies are found with the instruction that may result in the
instruction being invalid. These can be turned on with the option -M notes
to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
now only set the bottom bit of the address of thumb function symbols
if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
Build Attribute notes if none are present in the input sources. Add a
--enable-generate-build-notes=[yes|no] configure time option to set the
default behaviour. Set the default if the configure option is not used
to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
shorter instruction encoding.
- Add support for .nops directive. It is currently supported only for
x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
-z separate-code should be enabled in ELF linker by default. Default
to yes for Linux/x86 targets. Note that -z separate-code can increase
disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols
- Restore riscv64-elf cross prefix via symlinks
- Fix pacemaker libqb problem with section start/stop symbols
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
sections.
Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
option to objdump which causes indirect links into separate debug info files
to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
for every dynamic object loaded by an executable - provided that the loader
supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would
previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
within input section lists.
- Fix linker relaxation with --wrap
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-2265,SUSE-SLE-Module-Development-Tools-15-2018-2265
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils to version 2.31 fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service\n (excessive memory allocation) or possibly have unspecified other impact via a\n crafted ELF file that triggered a buffer overflow on fuzzed archive header\n (bsc#1065643)\n- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled\n NULL files in a .debug_line file table, which allowed remote attackers to cause\n a denial of service (NULL pointer dereference and application crash) via a\n crafted ELF file, related to concat_filename (bsc#1065689)\n- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)\n miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object\n file, which allowed remote attackers to cause a denial of service\n (find_abstract_instance_name invalid memory read, segmentation fault, and\n application crash) (bsc#1065693)\n- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (invalid memory access and application crash) or possibly have\n unspecified other impact via a crafted PE file (bsc#1068640)\n- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File\n Descriptor (BFD) library (aka libbfd) did not validate size and offset values\n in the data dictionary, which allowed remote attackers to cause a denial of\n service (segmentation violation and application crash) or possibly have\n unspecified other impact via a crafted PE file (bsc#1068643)\n- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not\n validate the symbol count, which allowed remote attackers to cause a denial of\n service (integer overflow and application crash, or excessive memory\n allocation) or possibly have unspecified other impact via a crafted PE file\n (bsc#1068887)\n- CVE-2017-16830: The print_gnu_property_note function did not have\n integer-overflow protection on 32-bit platforms, which allowed remote attackers\n to cause a denial of service (segmentation violation and application crash) or\n possibly have unspecified other impact via a crafted ELF file (bsc#1068888)\n- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File\n Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which\n allowed remote attackers to cause a denial of service (out-of-bounds read and\n application crash) or possibly have unspecified other impact via a crafted ELF\n file (bsc#1068950)\n- CVE-2017-16828: The display_debug_frames function allowed remote attackers to\n cause a denial of service (integer overflow and heap-based buffer over-read,\n and application crash) or possibly have unspecified other impact via a crafted\n ELF file (bsc#1069176)\n- CVE-2017-16827: The aout_get_external_symbols function in the Binary File\n Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a\n denial of service (slurp_symtab invalid free and application crash) or possibly\n have unspecified other impact via a crafted ELF file (bsc#1069202)\n- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)\n library (aka libbfd) had an unsigned integer overflow because bfd_size_type\n multiplication is not used. A crafted ELF file allowed remote attackers to\n cause a denial of service (application crash) or possibly have unspecified\n other impact (bsc#1077745)\n- CVE-2018-6543: Prevent integer overflow in the function\n load_specific_debug_section() which resulted in `malloc()` with 0 size. A\n crafted ELF file allowed remote attackers to cause a denial of service\n (application crash) or possibly have unspecified other impact (bsc#1079103)\n- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File\n Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.\n Remote attackers could have leveraged this vulnerability to cause a denial of\n service (segmentation fault) via a crafted ELF file (bsc#1079741)\n- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (out-of-bounds read and segmentation violation) via a note with a large\n alignment (bsc#1080556)\n- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File\n Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed\n remote attackers to cause a denial of service (segmentation fault) or possibly\n have unspecified other impact via a crafted file, as demonstrated by objcopy of\n a COFF object (bsc#1081527)\n- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in\n the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers\n to cause a denial of service (NULL pointer dereference and application crash)\n via an ELF file with a RELRO segment that lacks a matching LOAD segment, as\n demonstrated by objcopy (bsc#1083528)\n- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed\n remote attackers to cause a denial of service (integer underflow or overflow,\n and application crash) via an ELF file with a corrupt DWARF FORM block, as\n demonstrated by nm (bsc#1083532)\n- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File\n Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a\n denial of service (segmentation fault) via a large attribute section\n (bsc#1086608)\n- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to\n cause a denial of service (integer overflow and application crash) or possibly\n have unspecified other impact via a crafted ELF file, as demonstrated by\n objdump (bsc#1086784)\n- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor\n (BFD) library (aka libbfd) allowed remote attackers to cause a denial of\n service (aout_32_swap_std_reloc_out NULL pointer dereference and application\n crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786)\n- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)\n library (aka libbfd) allowed remote attackers to cause a denial of service\n (integer overflow and application crash) via an ELF file with corrupt dwarf1\n debug information, as demonstrated by nm (bsc#1086788)\n- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library\n (aka libbfd) allowed remote attackers to cause a denial of service (NULL\n pointer dereference and application crash) via a crafted binary file, as\n demonstrated by nm-new (bsc#1090997)\n- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a\n denial of service (heap-based buffer over-read and application crash) via a\n crafted binary file, as demonstrated by readelf (bsc#1091015)\n- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor\n (BFD) library (aka libbfd) did not validate the output_section pointer in the\n case of a symtab entry with a 'SECTION' type that has a '0' value, which\n allowed remote attackers to cause a denial of service (NULL pointer dereference\n and application crash) via a crafted file, as demonstrated by objcopy\n (bsc#1091365)\n- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the\n Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data\n Directory size with an unbounded loop that increased the value of\n (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own\n memory region, resulting in an out-of-bounds memory write, as demonstrated by\n objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common\n in pex64igen.c (bsc#1091368)\n\nThese non-security issues were fixed:\n\n- The AArch64 port now supports showing disassembly notes which are emitted\n when inconsistencies are found with the instruction that may result in the\n instruction being invalid. These can be turned on with the option -M notes\n to objdump.\n- The AArch64 port now emits warnings when a combination of an instruction and\n a named register could be invalid.\n- Added O modifier to ar to display member offsets inside an archive\n- The ADR and ADRL pseudo-instructions supported by the ARM assembler\n now only set the bottom bit of the address of thumb function symbols\n if the -mthumb-interwork command line option is active.\n- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU\n Build Attribute notes if none are present in the input sources. Add a\n --enable-generate-build-notes=[yes|no] configure time option to set the\n default behaviour. Set the default if the configure option is not used\n to 'no'.\n- Remove -mold-gcc command-line option for x86 targets.\n- Add -O[2|s] command-line options to x86 assembler to enable alternate\n shorter instruction encoding.\n- Add support for .nops directive. It is currently supported only for\n x86 targets.\n- Speed up direct linking with DLLs for Cygwin and Mingw targets.\n- Add a configure option --enable-separate-code to decide whether\n -z separate-code should be enabled in ELF linker by default. Default\n to yes for Linux/x86 targets. Note that -z separate-code can increase\n disk and memory size.\n- RISC-V: Fix symbol address problem with versioned symbols \n- Restore riscv64-elf cross prefix via symlinks\n- Fix pacemaker libqb problem with section start/stop symbols\n- RISC-V: Don't enable relaxation in relocatable link\n- Prevent linking faiures on i386 with assertion (bsc#1085784)\n- Fix symbol size bug when relaxation deletes bytes\n- Add --debug-dump=links option to readelf and --dwarf=links option to objdump\n which displays the contents of any .gnu_debuglink or .gnu_debugaltlink\n sections.\n Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links\n option to objdump which causes indirect links into separate debug info files\n to be followed when dumping other DWARF sections.\n- Add support for loaction views in DWARF debug line information.\n- Add -z separate-code to generate separate code PT_LOAD segment.\n- Add '-z undefs' command line option as the inverse of the '-z defs' option.\n- Add -z globalaudit command line option to force audit libraries to be run\n for every dynamic object loaded by an executable - provided that the loader\n supports this functionality.\n- Tighten linker script grammar around file name specifiers to prevent the use\n of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would\n previously be accepted but had no effect.\n- The EXCLUDE_FILE directive can now be placed within any SORT_* directive\n within input section lists.\n- Fix linker relaxation with --wrap\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Basesystem-15-2018-2265,SUSE-SLE-Module-Development-Tools-15-2018-2265", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3170-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3170-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183170-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3170-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html", }, { category: "self", summary: "SUSE Bug 1065643", url: "https://bugzilla.suse.com/1065643", }, { category: "self", summary: "SUSE Bug 1065689", url: "https://bugzilla.suse.com/1065689", }, { category: "self", summary: "SUSE Bug 1065693", url: "https://bugzilla.suse.com/1065693", }, { category: "self", summary: "SUSE Bug 1068640", url: "https://bugzilla.suse.com/1068640", }, { category: "self", summary: "SUSE Bug 1068643", url: "https://bugzilla.suse.com/1068643", }, { category: "self", summary: "SUSE Bug 1068887", url: "https://bugzilla.suse.com/1068887", }, { category: "self", summary: "SUSE Bug 1068888", url: "https://bugzilla.suse.com/1068888", }, { category: "self", summary: "SUSE Bug 1068950", url: "https://bugzilla.suse.com/1068950", }, { category: "self", summary: "SUSE Bug 1069176", url: "https://bugzilla.suse.com/1069176", }, { category: "self", summary: "SUSE Bug 1069202", url: "https://bugzilla.suse.com/1069202", }, { category: "self", summary: "SUSE Bug 1075418", url: "https://bugzilla.suse.com/1075418", }, { category: "self", summary: "SUSE Bug 1077745", url: "https://bugzilla.suse.com/1077745", }, { category: "self", summary: "SUSE Bug 1079103", url: "https://bugzilla.suse.com/1079103", }, { category: "self", summary: "SUSE Bug 1079741", url: "https://bugzilla.suse.com/1079741", }, { category: "self", summary: "SUSE Bug 1080556", url: "https://bugzilla.suse.com/1080556", }, { category: "self", summary: "SUSE Bug 1081527", url: "https://bugzilla.suse.com/1081527", }, { category: "self", summary: "SUSE Bug 1083528", url: "https://bugzilla.suse.com/1083528", }, { category: "self", summary: "SUSE Bug 1083532", url: "https://bugzilla.suse.com/1083532", }, { category: "self", summary: "SUSE Bug 1085784", url: "https://bugzilla.suse.com/1085784", }, { category: "self", summary: "SUSE Bug 1086608", url: "https://bugzilla.suse.com/1086608", }, { category: "self", summary: "SUSE Bug 1086784", url: "https://bugzilla.suse.com/1086784", }, { category: "self", summary: "SUSE Bug 1086786", url: "https://bugzilla.suse.com/1086786", }, { category: "self", summary: "SUSE Bug 1086788", url: "https://bugzilla.suse.com/1086788", }, { category: "self", summary: "SUSE Bug 1090997", url: "https://bugzilla.suse.com/1090997", }, { category: "self", summary: "SUSE Bug 1091015", url: "https://bugzilla.suse.com/1091015", }, { category: "self", summary: "SUSE Bug 1091365", url: "https://bugzilla.suse.com/1091365", }, { category: "self", summary: "SUSE Bug 1091368", url: "https://bugzilla.suse.com/1091368", }, { category: "self", summary: "SUSE CVE CVE-2017-15938 page", url: "https://www.suse.com/security/cve/CVE-2017-15938/", }, { category: "self", summary: "SUSE CVE CVE-2017-15939 page", url: "https://www.suse.com/security/cve/CVE-2017-15939/", }, { category: "self", summary: "SUSE CVE CVE-2017-15996 page", url: "https://www.suse.com/security/cve/CVE-2017-15996/", }, { category: "self", summary: "SUSE CVE CVE-2017-16826 page", url: "https://www.suse.com/security/cve/CVE-2017-16826/", }, { category: "self", summary: "SUSE CVE CVE-2017-16827 page", url: "https://www.suse.com/security/cve/CVE-2017-16827/", }, { category: "self", summary: "SUSE CVE CVE-2017-16828 page", url: "https://www.suse.com/security/cve/CVE-2017-16828/", }, { category: "self", summary: "SUSE CVE CVE-2017-16829 page", url: "https://www.suse.com/security/cve/CVE-2017-16829/", }, { category: "self", summary: "SUSE CVE CVE-2017-16830 page", url: "https://www.suse.com/security/cve/CVE-2017-16830/", }, { category: "self", summary: "SUSE CVE CVE-2017-16831 page", url: "https://www.suse.com/security/cve/CVE-2017-16831/", }, { category: "self", summary: "SUSE CVE CVE-2017-16832 page", url: "https://www.suse.com/security/cve/CVE-2017-16832/", }, { category: "self", summary: "SUSE CVE CVE-2018-10372 page", url: "https://www.suse.com/security/cve/CVE-2018-10372/", }, { category: "self", summary: "SUSE CVE CVE-2018-10373 page", url: "https://www.suse.com/security/cve/CVE-2018-10373/", }, { category: "self", summary: "SUSE CVE CVE-2018-10534 page", url: "https://www.suse.com/security/cve/CVE-2018-10534/", }, { category: "self", summary: "SUSE CVE CVE-2018-10535 page", url: "https://www.suse.com/security/cve/CVE-2018-10535/", }, { category: "self", summary: "SUSE CVE CVE-2018-6323 page", url: "https://www.suse.com/security/cve/CVE-2018-6323/", }, { category: "self", summary: "SUSE CVE CVE-2018-6543 page", url: "https://www.suse.com/security/cve/CVE-2018-6543/", }, { category: "self", summary: "SUSE CVE CVE-2018-6759 page", url: "https://www.suse.com/security/cve/CVE-2018-6759/", }, { category: "self", summary: "SUSE CVE CVE-2018-6872 page", url: "https://www.suse.com/security/cve/CVE-2018-6872/", }, { category: "self", summary: "SUSE CVE CVE-2018-7208 page", url: "https://www.suse.com/security/cve/CVE-2018-7208/", }, { category: "self", summary: "SUSE CVE CVE-2018-7568 page", url: "https://www.suse.com/security/cve/CVE-2018-7568/", }, { category: "self", summary: "SUSE CVE CVE-2018-7569 page", url: "https://www.suse.com/security/cve/CVE-2018-7569/", }, { category: "self", summary: "SUSE CVE CVE-2018-7570 page", url: "https://www.suse.com/security/cve/CVE-2018-7570/", }, { category: "self", summary: "SUSE CVE CVE-2018-7642 page", url: "https://www.suse.com/security/cve/CVE-2018-7642/", }, { category: "self", summary: "SUSE CVE CVE-2018-7643 page", url: "https://www.suse.com/security/cve/CVE-2018-7643/", }, { category: "self", summary: "SUSE CVE CVE-2018-8945 page", url: "https://www.suse.com/security/cve/CVE-2018-8945/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2018-10-16T13:35:47Z", generator: { date: "2018-10-16T13:35:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3170-1", initial_release_date: "2018-10-16T13:35:47Z", revision_history: [ { date: "2018-10-16T13:35:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.31-6.3.1.aarch64", product: { name: "binutils-2.31-6.3.1.aarch64", product_id: "binutils-2.31-6.3.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.31-6.3.1.aarch64", product: { name: "binutils-devel-2.31-6.3.1.aarch64", product_id: "binutils-devel-2.31-6.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-2.31-6.3.1.ppc64le", product: { name: "binutils-2.31-6.3.1.ppc64le", product_id: "binutils-2.31-6.3.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.31-6.3.1.ppc64le", product: { name: "binutils-devel-2.31-6.3.1.ppc64le", product_id: "binutils-devel-2.31-6.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.31-6.3.1.s390x", product: { name: "binutils-2.31-6.3.1.s390x", product_id: "binutils-2.31-6.3.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.31-6.3.1.s390x", product: { name: "binutils-devel-2.31-6.3.1.s390x", product_id: "binutils-devel-2.31-6.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.31-6.3.1.x86_64", product: { name: "binutils-2.31-6.3.1.x86_64", product_id: "binutils-2.31-6.3.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.31-6.3.1.x86_64", product: { name: "binutils-devel-2.31-6.3.1.x86_64", product_id: "binutils-devel-2.31-6.3.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.31-6.3.1.x86_64", product: { name: "binutils-devel-32bit-2.31-6.3.1.x86_64", product_id: "binutils-devel-32bit-2.31-6.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15", product: { name: "SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.31-6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", }, product_reference: "binutils-2.31-6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", }, product_reference: "binutils-2.31-6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-6.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", }, product_reference: "binutils-2.31-6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-2.31-6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", }, product_reference: "binutils-2.31-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", }, product_reference: "binutils-devel-2.31-6.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", }, product_reference: "binutils-devel-2.31-6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-6.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", }, product_reference: "binutils-devel-2.31-6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.31-6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", }, product_reference: "binutils-devel-2.31-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.31-6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", }, product_reference: "binutils-devel-32bit-2.31-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, ], }, vulnerabilities: [ { cve: "CVE-2017-15938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15938", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15938", url: "https://www.suse.com/security/cve/CVE-2017-15938", }, { category: "external", summary: "SUSE Bug 1065693 for CVE-2017-15938", url: "https://bugzilla.suse.com/1065693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "important", }, ], title: "CVE-2017-15938", }, { cve: "CVE-2017-15939", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15939", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15939", url: "https://www.suse.com/security/cve/CVE-2017-15939", }, { category: "external", summary: "SUSE Bug 1061623 for CVE-2017-15939", url: "https://bugzilla.suse.com/1061623", }, { category: "external", summary: "SUSE Bug 1065689 for CVE-2017-15939", url: "https://bugzilla.suse.com/1065689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2017-15939", }, { cve: "CVE-2017-15996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15996", }, ], notes: [ { category: "general", text: "elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a \"buffer overflow on fuzzed archive header,\" related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15996", url: "https://www.suse.com/security/cve/CVE-2017-15996", }, { category: "external", summary: "SUSE Bug 1065643 for CVE-2017-15996", url: "https://bugzilla.suse.com/1065643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2017-15996", }, { cve: "CVE-2017-16826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16826", }, ], notes: [ { category: "general", text: "The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16826", url: "https://www.suse.com/security/cve/CVE-2017-16826", }, { category: "external", summary: "SUSE Bug 1068640 for CVE-2017-16826", url: "https://bugzilla.suse.com/1068640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2017-16826", }, { cve: "CVE-2017-16827", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16827", }, ], notes: [ { category: "general", text: "The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16827", url: "https://www.suse.com/security/cve/CVE-2017-16827", }, { category: "external", summary: "SUSE Bug 1069202 for CVE-2017-16827", url: "https://bugzilla.suse.com/1069202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2017-16827", }, { cve: "CVE-2017-16828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16828", }, ], notes: [ { category: "general", text: "The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16828", url: "https://www.suse.com/security/cve/CVE-2017-16828", }, { category: "external", summary: "SUSE Bug 1069176 for CVE-2017-16828", url: "https://bugzilla.suse.com/1069176", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "important", }, ], title: "CVE-2017-16828", }, { cve: "CVE-2017-16829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16829", }, ], notes: [ { category: "general", text: "The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16829", url: "https://www.suse.com/security/cve/CVE-2017-16829", }, { category: "external", summary: "SUSE Bug 1068950 for CVE-2017-16829", url: "https://bugzilla.suse.com/1068950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2017-16829", }, { cve: "CVE-2017-16830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16830", }, ], notes: [ { category: "general", text: "The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16830", url: "https://www.suse.com/security/cve/CVE-2017-16830", }, { category: "external", summary: "SUSE Bug 1068888 for CVE-2017-16830", url: "https://bugzilla.suse.com/1068888", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "important", }, ], title: "CVE-2017-16830", }, { cve: "CVE-2017-16831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16831", }, ], notes: [ { category: "general", text: "coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16831", url: "https://www.suse.com/security/cve/CVE-2017-16831", }, { category: "external", summary: "SUSE Bug 1068887 for CVE-2017-16831", url: "https://bugzilla.suse.com/1068887", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2017-16831", }, { cve: "CVE-2017-16832", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16832", }, ], notes: [ { category: "general", text: "The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16832", url: "https://www.suse.com/security/cve/CVE-2017-16832", }, { category: "external", summary: "SUSE Bug 1068643 for CVE-2017-16832", url: "https://bugzilla.suse.com/1068643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2017-16832", }, { cve: "CVE-2018-10372", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10372", }, ], notes: [ { category: "general", text: "process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10372", url: "https://www.suse.com/security/cve/CVE-2018-10372", }, { category: "external", summary: "SUSE Bug 1091015 for CVE-2018-10372", url: "https://bugzilla.suse.com/1091015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-10372", }, { cve: "CVE-2018-10373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10373", }, ], notes: [ { category: "general", text: "concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10373", url: "https://www.suse.com/security/cve/CVE-2018-10373", }, { category: "external", summary: "SUSE Bug 1090997 for CVE-2018-10373", url: "https://bugzilla.suse.com/1090997", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-10373", }, { cve: "CVE-2018-10534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10534", }, ], notes: [ { category: "general", text: "The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10534", url: "https://www.suse.com/security/cve/CVE-2018-10534", }, { category: "external", summary: "SUSE Bug 1091368 for CVE-2018-10534", url: "https://bugzilla.suse.com/1091368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2018-10534", }, { cve: "CVE-2018-10535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10535", }, ], notes: [ { category: "general", text: "The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10535", url: "https://www.suse.com/security/cve/CVE-2018-10535", }, { category: "external", summary: "SUSE Bug 1091365 for CVE-2018-10535", url: "https://bugzilla.suse.com/1091365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-10535", }, { cve: "CVE-2018-6323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6323", }, ], notes: [ { category: "general", text: "The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6323", url: "https://www.suse.com/security/cve/CVE-2018-6323", }, { category: "external", summary: "SUSE Bug 1077745 for CVE-2018-6323", url: "https://bugzilla.suse.com/1077745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-6323", }, { cve: "CVE-2018-6543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6543", }, ], notes: [ { category: "general", text: "In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6543", url: "https://www.suse.com/security/cve/CVE-2018-6543", }, { category: "external", summary: "SUSE Bug 1079103 for CVE-2018-6543", url: "https://bugzilla.suse.com/1079103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2018-6543", }, { cve: "CVE-2018-6759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6759", }, ], notes: [ { category: "general", text: "The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6759", url: "https://www.suse.com/security/cve/CVE-2018-6759", }, { category: "external", summary: "SUSE Bug 1079741 for CVE-2018-6759", url: "https://bugzilla.suse.com/1079741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2018-6759", }, { cve: "CVE-2018-6872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6872", }, ], notes: [ { category: "general", text: "The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6872", url: "https://www.suse.com/security/cve/CVE-2018-6872", }, { category: "external", summary: "SUSE Bug 1080556 for CVE-2018-6872", url: "https://bugzilla.suse.com/1080556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2018-6872", }, { cve: "CVE-2018-7208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7208", }, ], notes: [ { category: "general", text: "In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7208", url: "https://www.suse.com/security/cve/CVE-2018-7208", }, { category: "external", summary: "SUSE Bug 1081527 for CVE-2018-7208", url: "https://bugzilla.suse.com/1081527", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-7208", }, { cve: "CVE-2018-7568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7568", }, ], notes: [ { category: "general", text: "The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7568", url: "https://www.suse.com/security/cve/CVE-2018-7568", }, { category: "external", summary: "SUSE Bug 1086788 for CVE-2018-7568", url: "https://bugzilla.suse.com/1086788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-7568", }, { cve: "CVE-2018-7569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7569", }, ], notes: [ { category: "general", text: "dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7569", url: "https://www.suse.com/security/cve/CVE-2018-7569", }, { category: "external", summary: "SUSE Bug 1083532 for CVE-2018-7569", url: "https://bugzilla.suse.com/1083532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-7569", }, { cve: "CVE-2018-7570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7570", }, ], notes: [ { category: "general", text: "The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7570", url: "https://www.suse.com/security/cve/CVE-2018-7570", }, { category: "external", summary: "SUSE Bug 1083528 for CVE-2018-7570", url: "https://bugzilla.suse.com/1083528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-7570", }, { cve: "CVE-2018-7642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7642", }, ], notes: [ { category: "general", text: "The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7642", url: "https://www.suse.com/security/cve/CVE-2018-7642", }, { category: "external", summary: "SUSE Bug 1086786 for CVE-2018-7642", url: "https://bugzilla.suse.com/1086786", }, { category: "external", summary: "SUSE Bug 1128518 for CVE-2018-7642", url: "https://bugzilla.suse.com/1128518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-7642", }, { cve: "CVE-2018-7643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7643", }, ], notes: [ { category: "general", text: "The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7643", url: "https://www.suse.com/security/cve/CVE-2018-7643", }, { category: "external", summary: "SUSE Bug 1086784 for CVE-2018-7643", url: "https://bugzilla.suse.com/1086784", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "moderate", }, ], title: "CVE-2018-7643", }, { cve: "CVE-2018-8945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8945", }, ], notes: [ { category: "general", text: "The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8945", url: "https://www.suse.com/security/cve/CVE-2018-8945", }, { category: "external", summary: "SUSE Bug 1086608 for CVE-2018-8945", url: "https://bugzilla.suse.com/1086608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:binutils-devel-2.31-6.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:binutils-devel-32bit-2.31-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-16T13:35:47Z", details: "low", }, ], title: "CVE-2018-8945", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.